What is Card Testing? Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit… Daniel Smith | February 9, 2023
A Conversation with Mark Houpt, CISO of Radware Partner DataBank One of the many benefits that comes from working at Radware is the opportunity to work with cybersecurity professionals whose… Julie Igorevna | February 3, 2023
Software Supply Chain Risks for Low- and No-Code Application Development Supply chain attacks occur when a third-party vendor or partner with less robust security measures is breached, allowing attackers to… Pascal Geenens | February 2, 2023
Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes Phishing for 2FA codes is the latest in specialized bots that make it easier and quicker for fraudsters to fool… Neetu Singh | February 1, 2023
Radware’s New Partners Program Focuses on Cloud Business and Accelerates Incentives A partner program is measured by how beneficial it is for both parties. Beneficial is the perfect word to describe… Julie Igorevna | January 31, 2023
Exploring Killnet’s Social Circles It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally… Daniel Smith | January 27, 2023
3 Things to Consider When Selecting a Bot Manager A bot manager needs to do more than simply eradicate bots that come into contact with networks and employees. A… Richard Arneson | January 10, 2023
Predictor or Pitfall? Third Party Security Evaluators The use of 3rd parties to test the cyber hygiene of business partners and vendors has become increasingly common. Howard Taylor | January 5, 2023
Do This 1 Thing to Protect Your Organization This Holiday Season Unfortunately, the holidays are also an exciting time for cybercriminals. While we’re shopping, they’re on their own shopping sprees. It… Mark Houpt | December 20, 2022
Ukraine’s Response to Cyber Threats a Model in DDoS Prevention With the disruption, loss of life and heartbreaking images that the Russia-Ukraine conflict has produced, it is easy to overlook… Julie Igorevna | November 18, 2022
Credential Access via Information Stealers Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the… Daniel Smith | November 18, 2022
This was 3rd Quarter 2022 — A Cybersecurity Look Back In the third quarter of 2022, the four universal cyberattack drivers were accounted for: war, religion, politics and money. Pascal Geenens | November 15, 2022