This post is also available in: French German Italian Portuguese (Brazil) Spanish Russian

Pascal Geenens

60 POSTS0 COMMENTS
As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression

Newton’s third law of motion states that for every action, there is an equal and opposite reaction. With a slight alteration, Newton's law can be applied to geopolitics: for every action, there will be a more extensive opposite reaction. Newton's geopolitical version of the law can only lead to escalation as two opponents go back and forth, iterating through several responses.

Dependency Confusion Attacks

In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target the various...

Software Supply Chain Risks for Low- and No-Code Application Development

Supply chain attacks occur when a third-party vendor or partner with less robust security measures is breached, allowing attackers to indirectly gain...

This was 3rd Quarter 2022 — A Cybersecurity Look Back

In the third quarter of 2022, the four universal cyberattack drivers were accounted for: war, religion, politics and money.

OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows

After a week of speculation about OpenSSL vulnerabilities, the OpenSSL project disclosed two new CVEs to address buffer overrun vulnerabilities in its cryptographic library that could trigger crashes or lead to remote code execution (RCE).

This was H1 2022: Part 3 – Beyond the War

Being caught up in all the events and media attention stemming from the Russo-Ukrainian conflict, one could forget...

This was H1 2022: Part 2 – Cyber War

On February 24, 2022, news broke that Russia had initiated its special military operation against Ukraine. That date, which marked the start of the...

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors...

2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape.