Radware releases series II of its hacker’s Almanac 2021

MAHWAH, NJ, November 22, 2021 (GLOBE NEWSWIRE) – Radware®, (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions, today introduced Series II of its Hacker’s Almanac 2021. The three-part series is a field guide to infosecurity for security and IT professionals as well as executive decision-makers responsible for protecting their organizations. In a lessons learned format, Series II unfolds the Tactics, Techniques, and Procedures (TTPs) used by notorious actors in real-world cyberattacks, and shows how these TTPs fit into the MITER ATT & CK framework.

The Hacker’s Almanac series serves as a cornerstone to help organizations understand:

  • The landscape of threats.
  • Why they might be in danger.
  • Their attack surface.
  • How attackers can target an environment.

“Understanding the objectives, tactics and methods of malicious actors is an important step in an organization’s journey towards a balanced security strategy,” said Pascal Geenens, director of threat intelligence at Radware. “By gaining a better understanding of their adversaries’ TTPs, organizations will be better prepared to detect, isolate, deceive and kick out threat actors who might target their environment. “

The Pirate Almanac Series II describes tactics and techniques, ranging from scouting to start an operation and the initial access required to gain a foothold in a victim’s network, to executing the attack , defense evasion strategies and exfiltration. It gives examples of actual attacks targeting supply chains, critical infrastructure, IOT devices, financial assets, etc. And it details how bots, DDoS attacks, credential stuffing, router hijacking, and other extortion techniques and tactics are used to exploit their victims.

“If there was one word to describe what organizations should expect from cybercrime in 2022, it would be ‘more,’ said Geenens. “More sophisticated and high intensity attacks. Smarter attackers with bigger budgets. Increased pressure on supply chains and critical infrastructure. And bigger and bolder threats of extortion. In short, the security community will need to be more vigilant than ever, and organizations will need to go to great lengths to keep their attack surfaces under control. The past two years have ushered in a new era for cybercrime and information security, and it’s not going away anytime soon. “

Released earlier this year, Hacker’s Almanac Series I offers a glimpse of current threat actors. A copy of this report can be obtained here.

About Radware
Radware® (NASDAQ: RDWR) is a global leader in cybersecurity and application delivery solutions for physical, cloud and software-defined data centers. Its award-winning portfolio of solutions secures the digital experience by providing infrastructure, application and enterprise IT protection and availability services to businesses around the world. Radware’s solutions enable businesses and operators around the world to quickly adapt to market challenges, maintain business continuity and achieve maximum productivity while reducing costs. For more information, please visit the Radware website.

Radware encourages you to join our community and follow us on: Facebook, LinkedIn, Radware Blog, Twitter, YouTube and Radware Mobile for iOS and Android.

© 2021 Radware Ltd. All rights reserved. All Radware products and solutions mentioned in this press release are protected by trademarks, patents and pending patent applications of Radware in the United States and other countries. For more details, please see: https://www.radware.com/LegalNotice/. All other brands and names are the property of their respective owners.

THIS PRESS RELEASE AND THE HACKER’S ALMANAC RADWARE 2021 SERIES REPORTS ARE PROVIDED FOR INFORMATION ONLY. THESE DOCUMENTS ARE NOT INTENDED TO BE AN INDICATOR OF RADWARE’S BUSINESS PERFORMANCE OR OPERATING RESULTS FOR ANY PREVIOUS, CURRENT OR FUTURE PERIOD.

Radware believes the information in this document to be accurate in all material respects as of the date of its publication. However, the information is provided without any express, legal or implied warranty and is subject to change without notice.

The content of any website or hyperlink mentioned in this press release is for informational purposes only and its content does not form part of this press release.

Safe Harbor Declaration
This press release includes “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. All statements made here that are not statements of historical fact, including statements about plans, prospects, beliefs or Radware’s opinions, are forward-looking. forward-looking statements. Generally, forward-looking statements can be identified by words such as “believes”, “expects”, “anticipates”, “intends”, “estimates”, “plans” and similar expressions. or future or conditional verbs such as “will,” “should”, “should”, “could” and “could.” For example, when we say that by gaining a better understanding of their adversaries’ TTPs, organizations will be better prepared to detect, isolate, deceive and expel threat actors who may target their environment, we use a forward-looking statement. As these statements deal with future events, they are subject to various risks and uncertainties, and the results actual, expressed or implied by such forward-looking statements, could differ materially from Radware’s current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to limited to: the impact of global economic conditions and market volatility for our products; natural disasters and public health crises, such as the 2019 coronavirus disease pandemic (COVID-19); our ability to scale our operations effectively; timely availability and customer acceptance of our new and existing solutions; risks and uncertainties associated with acquisitions or other investments; the impact of economic and political uncertainties and weaknesses in various regions of the world, including the onset or escalation of hostilities or acts of terrorism; intense competition in the cybersecurity and application delivery solutions market and in our industry in general, and changes in the competitive landscape; changes in government regulations; breakdowns, interruptions or delays in hosting services or our internal network system; compliance with open source and third party licenses; the risk that our intangible assets or goodwill will be impaired; our dependence on independent distributors to sell our products; long sales cycles for our solutions; changes in foreign currency exchange rates; undetected defects or errors in our products or failure of our products to protect against malicious attacks; component availability and manufacturing capability; the ability of suppliers to supply our hardware platforms and components for our major accessories; our ability to protect our proprietary technology; claims for infringement of intellectual property filed by third parties; changes in tax laws; our ability to meet our investment objectives for our cash and liquid investments; our ability to attract, train and retain highly qualified personnel; and other factors and risks over which we may have little or no control. The purpose of this list is to identify only some of the main factors that could cause actual results to vary. For a more detailed description of the risks and uncertainties affecting Radware, see Radware’s annual report on Form 20-F, filed with the Securities and Exchange Commission (SEC) and other risk factors discussed from time to time by Radware in reports filed with, or provided to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware does not undertake to revise or update any forward-looking statement to reflect events or circumstances. after the date of said declaration. is made. Radware’s public documents are available on the SEC’s website at www.sec.gov or can be obtained from Radware’s website at www.radware.com.

Media contacts:
Gerri Dyrek
Radware
[email protected]


Source link

Comments are closed.