Latest news with #Radware


Techday NZ
6 days ago
- Business
- Techday NZ
Radware honours Bell Canada & Presidio for cybersecurity work
Radware has named Bell Canada and Presidio as its Partners of the Year, recognising their contributions to cybersecurity and service delivery. Bell Canada, the largest communications company in Canada, and Presidio, a technology services provider with a presence in APAC, were honoured by Radware for their performance as partners in the area of application security and delivery solutions for multi-cloud environments. The annual award is designed to acknowledge partners that demonstrate dedication to cyber security innovation, customer service excellence, and strong business performance. Yoav Gazelle, Radware's Chief Business Officer, said, "We are proud to recognize Bell and Presidio for their continued partnership and outstanding achievements. They are on the frontlines each day equipping customers with the critical cloud security solutions needed to mitigate risks and stay ahead of emerging threats to networks and applications. Together, we have created a powerful force for fighting cybercrime." Both Bell Canada and Presidio make use of Radware's Distributed Denial of Service (DDoS) and Cloud Application Protection Services to defend their own infrastructures. In addition, they offer these security solutions to their respective customer bases. Presidio incorporates Radware's applications and API security solutions, bot manager, and DDoS protection into its cyber security suite, which is available to customers managing on-premise, cloud, and hybrid environments. The company is known for its established expertise in IT, artificial intelligence, automation, security, networking, digital transformation, and cloud computing. Justin Tibbs, Vice President, Cyber Security Practice at Presidio, commented, "This award recognizes Presidio's expertise in helping companies navigate the complexities of deploying and running an end-to-end cybersecurity solution, mitigating risk, and achieving compliance. Our goal is to help make cybersecurity an innovation accelerator rather than a blocker, and our work with Radware plays an essential role in that approach." Bell delivers Radware's comprehensive cloud security suite through its security-as-a-service offering. This includes Radware's integrated Cloud Application and DDoS Protection Services, which are part of Bell's portfolio for customers seeking to protect against cyberthreats affecting web and application environments. Errol Fernandes, Bell's National Director, Solution Sales – Security and Cloud, said, "Winning Radware's Partner of the Year award for the second consecutive year is a tremendous honour. Our collaboration with Radware is a key component of our approach to safeguarding our customers from web and application cyberthreats." Radware's broader global partner programme supports resellers, managed security service providers, carriers, and cloud service providers, offering training, financial incentives, and support materials. The programme aims to foster sales growth and enhance value delivery throughout the customer lifecycle using Radware's cloud services and solutions. Enterprises and carriers across the world utilise Radware's technology to address challenges in cybersecurity and to protect their business operations and brands from evolving threats, while managing costs.
Yahoo
25-05-2025
- Business
- Yahoo
Leading Proxy Advisory Firm Glass Lewis Recommends Radware Stockholders Vote in Favor of Compensation Proposal for Chief Executive Officer
TEL AVIV, Israel, May 25, 2025 (GLOBE NEWSWIRE) -- Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced that Glass Lewis, a leading independent proxy advisory firm, has recommended that stockholders vote 'FOR' the compensation proposal for Radware's president and chief executive officer at the Company's upcoming Extraordinary General Meeting of Shareholders (the 'Extraordinary General Meeting' or the 'Meeting'). In its report, Glass Lewis found that the annual bonus and long-term equity incentives are appropriately aligned with both performance and prevailing market practices. 'We are pleased that Glass Lewis supports our proposal for the modification of the compensation structure for Radware's president and chief executive officer,' said Meir Moshe, chairman of Radware's compensation committee. 'The compensation structure has been modified to better strengthen the alignment of pay and performance that serves in the best interests of our shareholders.' The Meeting will be held on Thursday, May 29, 2025, at 8:00 a.m. (EDT), at the offices of Radware Inc., 575 Corporate Drive, Mahwah, N.J. 07430, U.S.A. The record date for the Meeting is April 25, 2025. Detailed information about the compensation proposal for Radware's president and chief executive officer can be found in Radware's proxy statement. A copy of the proxy statement and proxy card may be obtained for free from the SEC's website at and from the Company's website at or by directing such request to the Company's investor relations department at ir@ If stockholders have any questions or need assistance voting shares, they may contact ir@ About RadwareRadware® (NASDAQ: RDWR) is a global leader in application security and delivery solutions for multi-cloud environments. The company's cloud application, infrastructure, and API security solutions use AI-driven algorithms for precise, hands-free, real-time protection from the most sophisticated web, application, and DDoS attacks, API abuse, and bad bots. Enterprises and carriers worldwide rely on Radware's solutions to address evolving cybersecurity challenges and protect their brands and business operations while reducing costs. For more information, please visit the Radware website. Radware encourages you to join our community and follow us on: Facebook, LinkedIn, Radware Blog, X, and YouTube. ©2025 Radware Ltd. All rights reserved. Any Radware products and solutions mentioned in this press release are protected by trademarks, patents, and pending patent applications of Radware in the U.S. and other countries. For more details, please see: All other trademarks and names are property of their respective owners. The contents of any website or hyperlinks mentioned in this press release are for informational purposes and the contents thereof are not part of this press release. ContactsInvestor Relations:Yisca Erez, +972-72-3917211, ir@ Media Contacts:Gerri Dyrek, Safe Harbor Statement This press release includes 'forward-looking statements' within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements made herein that are not statements of historical fact, including statements about Radware's plans, outlook, beliefs, or opinions, are forward-looking statements. Generally, forward-looking statements may be identified by words such as 'believes,' 'expects,' 'anticipates,' 'intends,' 'estimates,' 'plans,' and similar expressions or future or conditional verbs such as 'will,' 'should,' 'would,' 'may,' and 'could.' Because such statements deal with future events, they are subject to various risks and uncertainties, and actual results, expressed or implied by such forward-looking statements, could differ materially from Radware's current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions, including as a result of the state of war declared in Israel in October 2023 and instability in the Middle East, the war in Ukraine, tensions between China and Taiwan, financial and credit market fluctuations (including elevated interest rates), impacts from tariffs or other trade restrictions, inflation, and the potential for regional or global recessions; our dependence on independent distributors to sell our products; our ability to manage our anticipated growth effectively; our business may be affected by sanctions, export controls, and similar measures, targeting Russia and other countries and territories, as well as other responses to Russia's military conflict in Ukraine, including indefinite suspension of operations in Russia and dealings with Russian entities by many multi-national businesses across a variety of industries; the ability of vendors to provide our hardware platforms and components for the manufacture of our products; our ability to attract, train, and retain highly qualified personnel; intense competition in the market for cybersecurity and application delivery solutions and in our industry in general, and changes in the competitive landscape; our ability to develop new solutions and enhance existing solutions; the impact to our reputation and business in the event of real or perceived shortcomings, defects, or vulnerabilities in our solutions, if our end-users experience security breaches, or if our information technology systems and data, or those of our service providers and other contractors, are compromised by cyber-attackers or other malicious actors or by a critical system failure; our use of AI technologies that present regulatory, litigation, and reputational risks; risks related to the fact that our products must interoperate with operating systems, software applications and hardware that are developed by others; outages, interruptions, or delays in hosting services; the risks associated with our global operations, such as difficulties and costs of staffing and managing foreign operations, compliance costs arising from host country laws or regulations, partial or total expropriation, export duties and quotas, local tax exposure, economic or political instability, including as a result of insurrection, war, natural disasters, and major environmental, climate, or public health concerns; our net losses in the past and the possibility that we may incur losses in the future; a slowdown in the growth of the cybersecurity and application delivery solutions market or in the development of the market for our cloud-based solutions; long sales cycles for our solutions; risks and uncertainties relating to acquisitions or other investments; risks associated with doing business in countries with a history of corruption or with foreign governments; changes in foreign currency exchange rates; risks associated with undetected defects or errors in our products; our ability to protect our proprietary technology; intellectual property infringement claims made by third parties; laws, regulations, and industry standards affecting our business; compliance with open source and third-party licenses; complications with the design or implementation of our new enterprise resource planning ('ERP') system; our reliance on information technology systems; our ESG disclosures and initiatives; and other factors and risks over which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, refer to Radware's Annual Report on Form 20-F, filed with the Securities and Exchange Commission (SEC), and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware's public filings are available from the SEC's website at or may be obtained on Radware's website at in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Techday NZ
23-05-2025
- Business
- Techday NZ
Radware named leader for AI-driven API security by GigaOm
Radware has been recognised as a Leader and Fast Mover in the GigaOm Radar for Application and API Security. The GigaOm Radar evaluated 16 leading application and API security solutions, aiming to assist organisations in making informed decisions about their security investments. Radware received particular recognition for its approaches to vulnerability detection, account takeover protection, and bot management. The report highlighted Radware's coverage of key industry benchmarks. According to the GigaOm Radar, "Radware's comprehensive coverage of OWASP Top 10 web application security risks and Top 10 API security vulnerabilities, coupled with real-time adaption capabilities, demonstrates a cutting-edge approach to AI-enhanced vulnerability detection that goes beyond the basics to offer advanced protection and automated response." The company's machine-learning-driven approach to detecting and mitigating attacks was also noted. GigaOm wrote, "Radware's system also includes ML-based anomaly detection that can identify anomalies on targeted endpoints and automatically push real-time signatures to mitigate attacks, demonstrating a proactive and adaptive approach to account takeover protection that goes beyond standard measures." GigaOm further commented on Radware's multilayered security strategy, stating, "Radware earned a strong score due to a multilayered strategy that includes preemptive protection to block unwanted IPs and identities, AI-powered behavioral-based detection that catches threats others might miss, and advanced mitigation offering a wide range of granular and accurate options." Connie Stack, Chief Growth Officer at Radware, addressed the increasing demands being placed on application and API security in the current landscape. "Organizations are increasingly relying on web applications and APIs to operate their businesses, generate revenue, and engage customers, which is why keeping them secure has become so important—and more difficult," said Stack. "Our advanced AI and machine learning technologies offer customers real-time, state-of-the-art protection across an attack surface and threat landscape that is constantly evolving. We are honoured to be recognised among the market's leading providers of application and API security solutions by GigaOm." Radware's Cloud Application Protection Service comprises a suite of security features, including bot detection and management, API protection, a web application firewall (WAF), client-side protection, and application-layer DDoS protection. These capabilities are combined with end-to-end automation, behavioural-based detection, and 24/7 managed services. The offering is designed to deliver high standards of application protection while aiming to reduce false positives for its customers. The company has also received additional awards and recognitions for its application and network security solutions from other analysts in the field, including Aite-Novarica Group, Forrester, Gartner, KuppingerCole, and QKS Group. Radware provides cloud application, infrastructure, and API security solutions with the use of AI-driven algorithms intended to deliver real-time protection against a range of web, application, DDoS, API abuse, and bot-related threats. The organisation serves enterprises and carriers worldwide, supporting their efforts to address cybersecurity challenges and safeguard their business operations.


Scoop
14-05-2025
- Business
- Scoop
Cyber Threats Escalate As India-Pakistan Tensions Spill Online
Press Release – Radware Whats unfolding is a digital echo of the military conflict, said Radware in its report. The cyber battlefield is now just as active. The recent military confrontation between India and Pakistan is now being mirrored in cyberspace — and the digital fallout could affect far more than just government websites. On May 7, India launched Operation Sindoor, a series of missile strikes against what it called terrorist infrastructure in Pakistan. The operation, the largest of its kind since 1971, was a direct response to the killing of Indian tourists in Kashmir in April. Within hours, cyberattacks targeting Indian institutions began to spike — led not by states, but by loose, politically motivated hacktivist groups. These groups, often with ties to Southeast Asia and the Middle East, have ramped up cyber offensives against Indian government agencies, banks, telecoms, and even education providers, according to a new alert from cybersecurity firm Radware. 'What's unfolding is a digital echo of the military conflict,' said Radware in its report. 'The cyber battlefield is now just as active.' Why Businesses Should Care While most attacks so far have focused on government portals and public-facing websites, the tactics being used — especially distributed denial-of-service (DDoS) attacks — are just as capable of disrupting business operations. India's financial regulators have already taken notice. The National Stock Exchange and BSE temporarily blocked access to overseas users as a precaution, following threats of cyberattacks. Although trading remained unaffected, the move reflects the heightened alert level across sectors. The broader concern is the potential spillover. As nationalist hacktivist groups on both sides of the border escalate their activities, businesses may become collateral damage — especially if they serve public utilities, handle sensitive data, or operate infrastructure deemed symbolic or strategic. A Look at the Numbers In 2025 alone, over 100 Indian organizations have been targeted by hacktivists. At least 256 cyberattacks have been claimed by 26 different groups, many operating from Bangladesh, Pakistan, and beyond. Since Operation Sindoor, over 75% of new attacks have hit government systems, but finance, telecom, and manufacturing firms have also been affected. A New Kind of Threat Actor These aren't traditional criminal hackers seeking profit — they're ideologically driven activists using widely available tools to make political statements, disrupt services, and garner attention. Some groups have turned to open-source DDoS software like MegaMedusa, allowing even unskilled users to launch effective attacks with minimal setup. Radware also notes the emergence of 'hacktivist alliances' — informal partnerships between groups that may not share a language or region, but are united by perceived enemies. Some of these groups are even aligned with actors involved in conflicts outside South Asia, creating global linkages that complicate response strategies. What's Next? With threats still mounting, and major cyber groups like RipperSec and Mysterious Team Pakistan yet to act on recent pledges, the situation remains volatile. Indian-aligned hackers have already launched retaliatory campaigns, raising fears of a widening cyber conflict with no clear rules of engagement. For business leaders, especially those with operations in India, Pakistan, or connected markets, the message is clear: Review your cyber readiness plans — DDoS protection, monitoring, and incident response should be up to date. Pay attention to geopolitical developments, as they are increasingly tied to digital risk. Prepare for downstream impacts — even if your organization isn't a direct target, suppliers, partners, or critical platforms could be affected. As the line between physical and digital conflict continues to blur, businesses can no longer treat geopolitics as someone else's problem. In today's connected world, cyber risk is a frontline issue — and it's no longer theoretical.


Techday NZ
14-05-2025
- Politics
- Techday NZ
Cyberattacks surge amid India-Pakistan clashes after strikes
Cyberattacks by hacktivist groups have escalated following renewed tensions between India and Pakistan. On May 7, 2025, India conducted "Operation Sindoor," a series of 24 missile strikes over 25 minutes against nine sites described as "terrorist infrastructure" in Pakistan and the Pakistan-administered region of Kashmir. According to Indian authorities, this operation was a response to the mass killing of 26 Indian tourists in Kashmir on 22 April. While India claims the strikes killed more than 70 militants and avoided civilian areas, Pakistan alleges at least 26 civilian casualties, has vowed to respond, and reports shooting down five Indian jets. Subsequent artillery exchanges have been reported along the Line of Control, closures of airspace have occurred, and international actors have called for restraint. In anticipation of cyber reprisal, India moved to temporarily block overseas users from accessing the websites of the National Stock Exchange and BSE. Officials cited cyberthreat concerns as the reason for the move, affirming that trading operations remain unaffected, though access is being controlled while risks are evaluated. Indian media outlets have documented a rise in hacking claims linked to Pakistan, and Pakistan's cyber response agency, PKCERT, has warned that hostile actors are exploiting the escalation to spread disinformation and attack critical systems. Reports compiled by Radware indicate that India has remained a frequent target of hacktivist campaigns throughout 2025, with 26 different groups targeting 100 organisations and accounting for 256 Distributed Denial of Service (DDoS) attacks since January. Most attacks were concentrated in January, but the initial week of May has seen activity accelerate as geopolitical tensions have heightened. According to Radware, RipperSec has been responsible for over 30% of DDoS claims against Indian targets this year, followed by AnonSec (16.8%), Keymous+ (10.2%), Sylhet Gang (9%), and Mr Hamza (4.7%). Groups such as Anonymous VNLBN, Bangladesh Civilian Force, SPIDER-X, RuskiNet, Arabian Ghosts, AnonPioneers, Rabbit Cyber Team, Red Wolf Cyber, Nation of Saviors, and several others have also made claims of responsibility. Hacktivists on both sides are employing various methods, from DDoS attacks and botnets to website defacements and data leaks, with the objective of disrupting service and undermining public confidence. More than half of the claimed DDoS attacks have targeted governmental agencies, with other significant targets including entities in education (8.3%), finance (7.4%), manufacturing (6.5%), and telecommunications (6.5%). Since the events of May 7, DDoS attack activity aimed at India has intensified. Radware's analysis notes a spike at 4pm UTC (9:30pm IST) with up to seven claimed attacks per hour. Threat actors involved in these attacks include AnonSec, Keymous+, Mr Hamza, Anonymous VNLBN, Arabian Hosts, Islamic Hacker Army, Sylhet Gang, Red Wolf Cyber, and the Iranian group Vulture. In these attacks post-Operation Sindoor, more than 75% of the incidents were directed at government agencies, while the financial and telecom sectors accounted for 8.5% and 6.4% respectively, comprising the bulk of the activity observed. "Politically, socially and religiously motivated hacktivist groups are increasingly coordinating efforts, amplifying their attacks against shared adversaries," Radware said in its latest alert. "Hacktivists are using hybrid strategies, leveraging application-layer and volumetric DDoS attacks that complicate defences." The Radware alert continued: "Hacktivists on both sides are targeting critical infrastructure using Web DDoS attacks, botnets, data leaks, and defacements, aiming to disrupt services and erode public trust." Recent developments show several groups, including Sylhet Gang, Mysterious Team, and Red Wolf Cyber, declaring support for Pakistan and threatening expanded attacks on Indian systems. Radware observed that since 2024, there has been a growing pattern of collaboration among groups with different ideological motivations. "As noted in the Radware 2025 Global Threat Analysis Report, 2024 was a significant turning point for hacktivist alliances, as groups driven by different political, social and religious motivations united in coordinated campaigns to target shared perceived adversaries. In 2025, this trend has gained momentum, with more hacktivists offering mutual support for each other's actions and campaigns, amplifying their messages and boosting their visibility." The alert further stated: "In the wake of Operation Sindoor, new alliances are emerging among Southeast Asian hacktivists. Some of these alliances even extend to groups traditionally opposed to Israel, such as the Iranian hacktivist group Vulture." The situation, as described by Radware, remains volatile. "As of now, less than 24 hours have passed since the escalation between India and Pakistan, and the situation remains highly volatile. Several prominent politically motivated groups, such as RipperSec and Mysterious Team Pakistan, have publicly pledged to take action but have not yet claimed responsibility for any attacks. Their impending involvement could significantly raise the stakes." Hacktivist groups based in India are also expected to intensify activity, raising concerns about reciprocal cyberattacks on Pakistani infrastructure. "Simultaneously, hacktivist groups supporting India, such as Indian Cyber Force, Cryptojackers of India, Dex4o4 and Ghost Force are expected to intensify their efforts to target Pakistani organisations. This could create a dangerous cycle of retaliation, increasing the risk of further cyberattacks, potentially targeting critical infrastructure on both sides." The tactics used by hacktivists are varied. "Hacktivists frequently deploy application-layer DDoS attacks to target specific server resources, often without generating overwhelming traffic volumes. These attacks are harder to detect and mitigate, as they imitate legitimate user interactions. Common techniques include HTTPS encrypted floods and form POSTs, which overwhelm online services and their backend systems. This can result in significant service disruptions or even complete outages, especially for critical websites like government portals, financial institutions or news outlets." "Volumetric attacks, while generally less sophisticated, are still a common strategy employed by hacktivist groups to overwhelm network infrastructure. These attacks often involve tactics such as direct path UDP floods or reflection and amplification attacks, where the target is flooded with a massive volume of UDP packets. This consumes significant bandwidth and network resources, which can potentially bring down online services or impact connectivity." "Given the increasing sophistication of and orchestration between hacktivist groups, hybrid DDoS attacks that combine multiple techniques can be observed. These attacks could simultaneously target network infrastructure with volumetric methods while also executing application-layer attacks. These strategies complicate detection and mitigation efforts." Radware highlighted the accessibility of DDoS tools as a contributing factor, noting: "Many groups may use publicly available DDoS tools to conduct their attacks. RipperSec members, for example, maintain and share a tool called MegaMedusa. Built using MegaMedusa leverages its asynchronous and non-blocking I/O capabilities to manage multiple network connections efficiently, making it suitable for orchestrating extensive DDoS campaigns. The tool is publicly accessible via GitHub, allowing users to install and operate it with minimal technical expertise. Its user-friendly installation process involves executing a few commands, making it accessible even to individuals with limited technical backgrounds. The availability of these tools makes it easier for groups with varying levels of technical expertise to launch impactful attacks." "Hacktivist groups may also utilise botnets – networks of compromised devices, often IoT devices – to launch large-scale DDoS attacks. These botnets can be rented or created through the use of malware, enabling attackers to distribute traffic across a wide range of devices. Some hacktivist groups have evolved from politically and religiously motivated attackers to DDoS-as-a-service providers, offering these services either for a fee or in exchange for advertising on their Telegram channels." "Some hacktivists may also engage in website defacements and claim responsibility for data leaks as part of their strategy to create chaos and erode public trust in institutions. These actions are often intended to undermine the credibility of targeted organisations and spread ideological messages."