Daniel SmithBotnets: DDoS and BeyondTraditionally, DDoS is an avenue of profit for botherders. But today’s botnets have evolved to include several attack vectors other than…Nov 9, 2019Nov 9, 2019
Daniel SmithAre Darknet Take-Downs Effective?Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these…Nov 9, 2019Nov 9, 2019
Daniel SmithBots 101: This is Why We Can’t Have Nice ThingsIn our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I…Mar 19, 2019Mar 19, 2019
Daniel SmithinHackerNoon.comHow Secure Is Your Digital Super Bowl Experience?Over the last few years I have traveled around the world, researching and watching stadiums digitally evolve from the structures I once…Jan 30, 2019Jan 30, 2019
Daniel SmithTop 3 Cyberattacks Targeting Proxy ServersToday, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because…Jan 30, 2019Jan 30, 2019
Daniel SmithinHackerNoon.comAd Fraud 101: How Cybercriminals Profit from ClicksFraud is and always will be a cornerstone of the cybercrime community. The associated economic gains provide substantial motivation for…Jan 3, 2019Jan 3, 2019
Daniel Smith2018 In Review: Memcache and DrupalgeddonAttackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we…Dec 27, 2018Dec 27, 2018
Daniel SmithinHackerNoon.com2018 In Review: Schools Under AttackAs adoption of education technologies expanded in 2018, school networks were increasingly targeted by ransomware, data theft and denial of…Dec 22, 2018Dec 22, 2018
Daniel SmithinHackerNoon.com2018 In Review: Healthcare Under AttackRadware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and…Dec 12, 2018Dec 12, 2018
Daniel SmithinHackerNoon.com2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to…Dec 11, 2018Dec 11, 2018