Home Search

Threat Researchers Live - search results

If you're not happy with the results, please do another search

Coronavirus: Its Four Most Prevalent Cyber Threats

The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19.

Threat Alert: TCP Amplification Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection...

FireEye Hack Turns into a Global Supply Chain Attack

The FireEye hack turned into a global supply chain attack affecting thousands of SolarWinds customers around the world.

To Pay or Not to Pay: It’s About the Provider

The question--to pay or not to pay ransom--goes back to another question: who is your DDoS mitigation provider?

Hybrid Warfare: How Cancel Culture Can Fuel a War

Countries in conflict are starting rely on a hybrid variation of tactics and techniques, including cyber activity and information/influential campaigns.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

The Issue & Impact of Malspam in the U.S. Elections

Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year.

When You Get Breached, So Do Your Customers

No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers.

K-Pop Fans Are the New Anonymous

Recent cyber events have proven why Anonymous is obsolete, highlighting the need for a new hacktivist group that doesn’t live off the names of the past.

COVID-19 Shows the Importance of Protecting Availability

The COVID-19 crisis offers no reprieve from cybercriminals, who are using this crisis as an opportunity to attack critical infrastructure.