Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joining, Daniel was a member of Radware’s Emergency Response Team (ERT-SOC), where he applied his unique expertise and intimate knowledge of threat actors’ tactics, techniques, and procedures to help develop signatures and mitigate attacks proactively for customers.
Over the last month there have been numerous TeamViewer users reporting unauthorized access into their computers that resulted in financial loss and stolen credentials....
Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is constantly targeted by attackers...
Over the last year, hacktivists driven by ideological differences have targeted government data around the world at a persistent rate. The lines are blurred...
Levi’s Stadium is one of the most technologically advanced stadiums ever built.
It features 12,000 network ports, 1,200 access points, 1,700 beacons, and a DAS...
Since Monday December 14th, Turkey’s DNS servers, ns1.nic.tr – ns5.nic.tr, have been the target of a persistent denial of service attack. This 40Gbps amplification...
It's been a busy few days here at Radware.
Our Emergency Response Team (ERT) has been closely monitoring a series of DDoS-for-Ransom attack campaigns that...