This post is also available in: French German Italian Portuguese (Brazil) Spanish Russian

Pascal Geenens

55 POSTS0 COMMENTS
As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

This was H1 2022: Part 3 – Beyond the War

Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget...

This was H1 2022: Part 2 – Cyber War

On February 24, 2022, news broke that Russia had initiated its special military operation against Ukraine. That date, which marked the start of the...

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors...

2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape. 

What Drives DDoS Attacks and Why it Should be a Concern

DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

Log4Shell: Critical log4j Vulnerability

The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library

DDOS Attacks Targeting Payment Services of Global Financial Institutions

A threat actor or group is actively targeting the online services of branches of global financial institutions

Ransomware & Ransom DoS, Why They Are Similar But Different

While ransomware and ransom DoS have a common objective their techniques are different, and so is the threat impact for organizations. 

Strengthening Online Applications Against Pass-the-Cookie Attacks

Cyber threat actors involved in cloud service attacks use a variety of tactics and techniques, including possible ‘pass-the-cookie’ attacks.