This post is also available in: French German Italian Portuguese (Brazil) Spanish Russian

Pascal Geenens

60 POSTS0 COMMENTS
As the Director, Threat Intelligence for Radware, Pascal helps execute the company's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of Information Technology and holds a degree in Civil Engineering from the Free University of Brussels. As part of the Radware Security Research team Pascal develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, did extensive research on Hajime and follows closely new developments of threats in the IoT space and the applications of AI in cyber security and hacking. Prior to Radware, Pascal was a consulting engineer for Juniper working with the largest EMEA cloud and service providers on their SDN/NFV and data center automation strategies. As an independent consultant, Pascal got skilled in several programming languages and designed industrial sensor networks, automated and developed PLC systems, and lead security infrastructure and software auditing projects. At the start of his career, he was a support engineer for IBM's Parallel System Support Program on AIX and a regular teacher and presenter at global IBM conferences on the topics of AIX kernel development and Perl scripting.

What Drives DDoS Attacks and Why it Should be a Concern

DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

Log4Shell: Critical log4j Vulnerability

The Apache Foundation released log4j version 2.15.0 as an emergency update for a critical vulnerability in the log4j2 library

DDOS Attacks Targeting Payment Services of Global Financial Institutions

A threat actor or group is actively targeting the online services of branches of global financial institutions

Ransomware & Ransom DoS, Why They Are Similar But Different

While ransomware and ransom DoS have a common objective their techniques are different, and so is the threat impact for organizations. 

Strengthening Online Applications Against Pass-the-Cookie Attacks

Cyber threat actors involved in cloud service attacks use a variety of tactics and techniques, including possible ‘pass-the-cookie’ attacks.

FireEye Hack Turns into a Global Supply Chain Attack

The FireEye hack turned into a global supply chain attack affecting thousands of SolarWinds customers around the world.

Beware the Security Threats from Remote Working

The rapid move to home working is posing problems for CIOs who want to keep the network secure. Here's what must happen to protect the network and its data.

Coronavirus: Its Four Most Prevalent Cyber Threats

The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19.

Security is on the Verge of a Major Transformation

While the internet can adapt to higher throughputs for richer data and more connected devices,it cannot adapt to the new requirements for lower latency.

The Quest To Automate The Business Of Fake News

Automation is valuable in detecting and eliminating manipulated media, and fighting against dis- and misinformation campaigns.