www.radware.com
Open in
urlscan Pro
66.225.237.43
Public Scan
Submitted URL: http://app.global.radware.com/e/er?s=788658067&lid=5907&elqTrackId=B46C15F8F1FA8D9F54D17AD0E6B77170&elq=28505760f10744ad8174a8...
Effective URL: https://www.radware.com/security/ddos-threats-attacks/passion-russian-botnet/
Submission: On August 28 via api from IN — Scanned from DE
Effective URL: https://www.radware.com/security/ddos-threats-attacks/passion-russian-botnet/
Submission: On August 28 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMPOST /security/ddos-threats-attacks/passion-russian-botnet/
<form method="post" action="/security/ddos-threats-attacks/passion-russian-botnet/" id="form">
<div class="aspNetHidden">
<input type="hidden" name="__CMSCsrfToken" id="__CMSCsrfToken" value="j0R7JqISI+Qaq4ZMLI3U+JE4sHzetGS8NA1FQmOUqZ4C9s9J6LWGoAmONf5EkYiOBN+ZF+32gq97eRfY6nH2j9a0E6EEuJ/OQBbCr+qsEIA=">
<input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="">
<input type="hidden" name="__EVENTARGUMENT" id="__EVENTARGUMENT" value="">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE"
value="7mY8UpohpS/n4rb2LM8qlLTzWcRDkiZffb5m1ZcSopg6+tKFzWZpPNuIe6YB5gI8poM0RAm32eqyFVZ04m7b/90Js0/+e13F0s88lEa0cwEZ9XitHw8xlpmD5gLb0yZ7lP5sqY0BwTZln9ZoZ5M6yc31THiSsnA0oGFb5L8JCNrLDu0LULwbzo3WMH1LA87cEt8CNSvIC5BP5+euSXzXwNhp4Kz9eXqgcf0fH510amaCUD1mH0sjMzSsN87u8PTmSSBfo71L3A0jLfIk7HnMMSvbSgnLeCNCmovYuA4knDmk6KaflF/1EvueBGCazWn6hW4fsD9O7JHYy839l/WqMPq+HGY2HctMTufqSP8+g5g=">
</div>
<script type="text/javascript">
//<![CDATA[
var theForm = document.forms['form'];
if (!theForm) {
theForm = document.form;
}
function __doPostBack(eventTarget, eventArgument) {
if (!theForm.onsubmit || (theForm.onsubmit() != false)) {
theForm.__EVENTTARGET.value = eventTarget;
theForm.__EVENTARGUMENT.value = eventArgument;
theForm.submit();
}
}
//]]>
</script>
<script src="https://ajax.aspnetcdn.com/ajax/4.6/1/WebForms.js" type="text/javascript"></script>
<script type="text/javascript">
//<![CDATA[
window.WebForm_PostBackOptions || document.write('<script type="text/javascript" src="/WebResource.axd?d=pynGkmcFUV13He1Qd6_TZNSpmbdtWzbICmWEHKlwpwzm_7RusW9R0wy8wi5idgiU-t2vXpDeSyflLueA_kgWug2&t=637814473746327080"><\/script>'); //]]>
</script>
<input type="hidden" name="lng" id="lng" value="en-US">
<script type="text/javascript">
//<![CDATA[
function PM_Postback(param) {
if (window.top.HideScreenLockWarningAndSync) {
window.top.HideScreenLockWarningAndSync(1080);
}
if (window.CMSContentManager) {
CMSContentManager.allowSubmit = true;
};
__doPostBack('m$am', param);
}
function PM_Callback(param, callback, ctx) {
if (window.top.HideScreenLockWarningAndSync) {
window.top.HideScreenLockWarningAndSync(1080);
}
if (window.CMSContentManager) {
CMSContentManager.storeContentChangedStatus();
};
WebForm_DoCallback('m$am', param, callback, ctx, null, true);
}
//]]>
</script>
<script src="https://ajax.aspnetcdn.com/ajax/4.6/1/MicrosoftAjax.js" type="text/javascript"></script>
<script type="text/javascript">
//<![CDATA[
(window.Sys && Sys._Application && Sys.Observer) || document.write(
'<script type="text/javascript" src="/ScriptResource.axd?d=NJmAwtEo3Ipnlaxl6CMhvuZm-2bNXwSMCSe1U1YgnD7UGscQ51dqzdGduyuLguR4PdjnxbZ2Mgi6sCIV1pGhHjRog8rJ0bp8DbdC9WYPmEUniLpSsMhhh8IzUQIt_h7oTKMg_tMyb-XUeM0KxL4h2fnbKdkZ34voG_a3kLcdf3U1&t=49337fe8"><\/script>'
); //]]>
</script>
<script src="https://ajax.aspnetcdn.com/ajax/4.6/1/MicrosoftAjaxWebForms.js" type="text/javascript"></script>
<script type="text/javascript">
//<![CDATA[
(window.Sys && Sys.WebForms) || document.write(
'<script type="text/javascript" src="/ScriptResource.axd?d=dwY9oWetJoJoVpgL6Zq8OCe-sXQqAJj4fT0B8zA6IBz67Vc63VbMN81NKUbjT-wCjEoGyjHekhdFc-V2XZDWdCRxp2XJmpe0c_TBZsCx3SbKgXsXdyS7Kkyk7q5W6PfU8x1z2ph2kYuABQdzQGO0VGqIfbyotqL-iLm3NTdWqTU1&t=49337fe8"><\/script>'
); //]]>
</script>
<script type="text/javascript">
//<![CDATA[
var CMS = CMS || {};
CMS.Application = {
"language": "en",
"imagesUrl": "/CMSPages/GetResource.ashx?image=%5bImages.zip%5d%2f",
"isDebuggingEnabled": false,
"applicationUrl": "/",
"isDialog": false,
"isRTL": "false"
};
//]]>
</script>
<div class="aspNetHidden">
<input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="A5343185">
<input type="hidden" name="__SCROLLPOSITIONX" id="__SCROLLPOSITIONX" value="0">
<input type="hidden" name="__SCROLLPOSITIONY" id="__SCROLLPOSITIONY" value="0">
</div>
<script type="text/javascript">
//<![CDATA[
Sys.WebForms.PageRequestManager._initialize('manScript', 'form', ['tctxM', ''], [], [], 90, '');
//]]>
</script>
<div id="ctxM">
</div>
<header class="header">
<div class="top">
<nav class="nav top__nav">
<ul>
<li class="is-visible-widescreen sm:p-r-0"><img src="/RadwareSite/MediaLibraries/Images/icons2018/icon-settings.svg" class="icon" alt="Support">
<a href="https://support.radware.com/">Support</a>
</li>
<li class="is-hidden-phone is-hidden-phone-xs"><img src="/RadwareSite/MediaLibraries/Images/icons2018/icon-book.svg" class="icon" alt="Training">
<a href="/training/">Training</a>
</li>
<li class="is-visible-widescreen sm:p-r-0"><img src="/RadwareSite/MediaLibraries/Images/icons2018/icon-person.svg" class="icon" alt="My Account"> <a href="/online-services">Online Services</a></li>
<li class="is-hidden-phone is-hidden-phone-xs is-hidden-tablet"><img src="/RadwareSite/MediaLibraries/Images/icons2018/icon_people.svg" class="icon" alt="Partners">
<a href="/partners/">Partners</a>
</li>
<li class="is-hidden-phone is-hidden-phone-xs is-hidden-tablet"><img src="/RadwareSite/MediaLibraries/Images/Icons/icon_groups_p.svg" class="icon" alt="Partners">
<a href="/customers/" data-rdwr-cta="link utility nav Partners">Customers</a>
</li>
<li class="is-hidden-phone is-hidden-phone-xs is-hidden-tablet"><img src="/RadwareSite/MediaLibraries/Images/Icons/icon_investor_relations.svg" class="icon" alt="Investor Relations">
<a href="/ir/">Investor Relations</a>
</li>
<li class="is-hidden-phone is-hidden-phone-xs is-hidden-tablet">
<img width="20" src="/RadwareSite/MediaLibraries/Images/Icons/globe-24px.svg" class="icon" alt="Lang">
<a href="#" data-toggle="modal" data-target="#modal-localWebsites" id="navLangText">English (US)</a>
</li>
<script>
function getLangTop(lang) {
el = document.getElementById('navLangText');
switch (lang) {
case "ja":
el.textContent = "日本語";
break;
case "de":
el.textContent = "Deutsch";
break;
case "zh-Hans":
el.textContent = "简体中文";
break;
case "kr":
el.textContent = "한국어";
break;
case "ru":
el.textContent = "Pусский";
break;
case "fr":
el.textContent = "Français";
break;
case "es":
el.textContent = "Español";
break;
default:
el.textContent = "English (US)";
}
}
getLangTop(document.documentElement.lang);
</script>
<li><a class="header-nav__contact is-hidden-desktop is-hidden-widescreen" href="/contactus/" data-rdwr-cta="button main nav Contact">Contact</a></li>
<li class="active-ua is-hidden-phone is-hidden-phone-xs is-hidden-tablet">
<a class="link" href="/underattack/" data-rdwr-cta="button utility nav Under Attack">
Under Attack?
</a>
</li>
</ul>
</nav>
</div>
<div class="header-nav"><a href="/" class="header-nav__logo"> <img src="/RadwareNext/images/logo.svg" alt="Radware"> </a>
<nav class="header-nav__links nav is-hidden-phone is-hidden-tablet is-hidden-phone-xs">
<ul class="header-nav__links-list">
<li class="header-nav__link"><a class="link js-header-nav-menu-open" href="#menu-tab-application-protection">
Application Protection </a></li>
<li class="header-nav__link"><a class="link js-header-nav-menu-open" href="#menu-tab-ddos-protection">
DDoS
Protection </a></li>
<li class="header-nav__link is-hidden-tablet"><a class="link js-header-nav-menu-open" href="#menu-tab-public-cloud-protection"> Public Cloud
Protection </a></li>
<li class="header-nav__link"><a class="link js-header-nav-menu-open" href="#menu-tab-application-delivery"> Application Delivery </a></li>
<li class="header-nav__link"><a class="link js-header-nav-menu-open" href="#menu-tab-service-providers"> Service Providers </a></li>
<li class="header-nav__link is-hidden-tablet"><a class="link js-header-nav-menu-open" href="#menu-tab-resources-downloads"> Resources </a>
</li>
<li class="header-nav__link" style="display: flex; align-items: center;"><a class="header-nav__contact" href="/contactus/" data-rdwr-cta="button main nav Contact">Contact</a>
</li>
</ul>
</nav>
<div class="header-nav__cell header-nav__active-ua is-hidden-desktop is-hidden-widescreen">
<a href="/underattack/" data-rdwr-cta="button utility nav Under Attack">
Under Attack?
</a>
</div>
<div class="header-nav__cell js-search-open is-hidden-phone is-hidden-phone-xs" role="button"><img src="/RadwareNext/images/icons/icon-search.svg" class="header-nav__icon" alt="Search"></div>
<div class="header-nav__cell js-sidebar-open" role="button"><img src="/RadwareNext/images/icons/icon-menu.svg" class="header-nav__icon" alt="Menu"></div>
</div>
</header>
<div class="push push--compact-menu"></div>
<!--Content-->
<div class="product-page">
<section class="section">
<div class="container">
<div class="article-container">
<div class="breadcrumbs breadcrumbs--fat ert-alert-breadcrumbs">
<ul>
<li>
<a href="/security/threat-advisories-attack-reports">THREAT ALERTS</a>
</li>
<li> Passion: A Russian Botnet </li>
</ul>
</div>
</div>
<article>
<div class="article-container">
<h1 class="product-lead__title m-t-1"> Passion: A Russian Botnet </h1>
<hr class="bg-color--info-easer m-b-1">
<div class="flex flex-between m-b-5">
<div class="flex">
<span class="date">
<img src="/RadwareNext/images/icons/icon-calendar.svg" class="social-media__icon" alt="January 31, 2023 11:10 AM">
<span> January 31, 2023 11:10 AM </span>
</span>
</div>
<div class="social-media">
<a href="https://twitter.com/intent/tweet?text=Passion: A Russian Botnet&url=https://radware.com/security/ddos-threats-attacks/passion-russian-botnet/" target="_blank">
<img src="/RadwareNext/images/icons/icon-twitter-cyan.svg" class="social-media__icon" alt="Twitter">
</a>
<a href="https://www.linkedin.com/shareArticle?mini=true&url=https://radware.com/security/ddos-threats-attacks/passion-russian-botnet/&title=Passion: A Russian Botnet" target="_blank">
<img src="/RadwareNext/images/icons/icon-linkedin-cyan.svg" class="social-media__icon" alt="LinkedIn">
</a>
</div>
</div>
</div>
<div class="article-container">
<div class="float-right column column-widescreen-4 column-desktop-4 column-tablet-5 column-phone-12 p-b-1 p-l-1">
<div class="card card--primary card--rounded">
<div><a download="" href="/WorkArea/DownloadAsset.aspx?ID=a2bb5ac4-3683-4396-a2b5-b0a6f11b6a66"><img alt="Russia's answer to disBalancer" border="0" class="figure" src="/RadwareSite/MediaLibraries/Images/Security/passion.jpg"> </a>
</div>
<div class="m-t-1">
<p><small>The Passion Botnet was leveraged during the attacks on January 27th, targeting medical institutions in the USA, Portugal, Spain, Germany, Poland, Finland, Norway, Netherlands, and the United Kingdom as retaliation for
sending tanks in support of Ukraine.</small></p>
<a class="btn btn--action btn--block small" download="" href="/WorkArea/DownloadAsset.aspx?ID=a2bb5ac4-3683-4396-a2b5-b0a6f11b6a66">Read the Complete Alert</a>
</div>
</div>
<div> </div>
</div>
<p>Passion group, affiliated with Killnet and Anonymous Russia, recently began offering DDoS-as-a-Service to pro- Russian hacktivists. The Passion Botnet was leveraged during the attacks on January 27th, targeting medical institutions in
the USA, Portugal, Spain, Germany, Poland, Finland, Norway, Netherlands, and the United Kingdom as retaliation for sending tanks in support of Ukraine.</p>
<h2 class="m-t-2 text-primary">Passion Botnet</h2>
<p>The origins of the Passion group remain unknown, but they have made their presence known recently, especially since the start of the new year. The group has been associated with defacement and denial-of-service attacks targeting
individuals and organizations who do not support the Russian invasion of Ukraine.</p>
<p>Passion has a strong online presence through its Telegram channels, some dating back to March 2022. Other hacktivist groups, such as Anonymous Russia, MIRAI, Venom, and Killnet, have promoted Passion.</p>
<p>The Passion group's tactics, techniques, and procedures (TTPs) resemble those of the other hacktivist groups involved in the Russo-Ukrainian conflict. After conducting a denial-of-service attack, the group typically posts a link to a
check-host[.]net page as evidence of their success.</p>
<h2 class="m-t-2 text-primary">Defacement Campaigns</h2>
<p>The group responsible for the Passion Botnet carried out several defacement attacks over the past month to spread their message and raise awareness. The defacements primarily targeted small organizations in Japan and South Africa. The
group's objective appears to be to use these attacks to draw attention to their botnet.</p>
<p class="text-center"><img alt="Figure 1: Passion Defacement left on the victim's website after a successful attack" class="figure" src="/RadwareSite/MediaLibraries/Images/Security/Passion-Defacement.jpg" style="max-width: 100%;">
<small> <strong>Figure 1: Passion Defacement left on the victim's website after a successful attack</strong> </small></p>
<p>Hacktivists and defacement attacks can pose a serious risk to targeted organizations. They can significantly harm an organization's reputation, causing a loss of trust and credibility with customers and stakeholders. The attacks can
escalate to theft or compromise of sensitive information by moving laterally across the infrastructure from the breached web server. The attacks lead to downtime and can disrupt critical business processes, resulting in higher
operational costs and impacting the overall efficiency of an organization. Additionally, breaches can lead to financial losses and legal liabilities. The aftermath of these attacks can be challenging. It may take considerable time and
resources to discover the full impact and all affected systems after a breach incident. It is essential for organizations to take proactive measures and have complete visibility in their hybrid infrastructure to detect and assess the
impact of breaches and defacements.</p>
<h2 class="m-t-2 text-primary">DDoS-as-a-Service</h2>
<p>The group behind the Passion Botnet is currently offering access to the service, for a fee, to pro-Russian hacktivists via several Telegram channels. Over the years, DDoS-as-a-Service became a standard tool for hacktivists because it
allows those without the ability to build and manage a botnet to launch significantly larger and more impacting attacks. <a href="/cyberpedia/ddospedia/ddos-meaning-what-is-ddos-attack/">DDoS</a> services are generally sold as a
subscription-based model, allowing customers to choose their attack vectors, duration, and intensity.</p>
<div class="card card--primary card—rounded m-t-2">
<h2 class="m-t-1">Continue Reading...</h2>
<p><a download="" href="/WorkArea/DownloadAsset.aspx?ID=a2bb5ac4-3683-4396-a2b5-b0a6f11b6a66">Click here to read</a> the full ERT Threat Alert.</p>
<p class="text-right"><a class="btn btn--action small" download="" href="/WorkArea/DownloadAsset.aspx?ID=a2bb5ac4-3683-4396-a2b5-b0a6f11b6a66">Read the full threat alert now </a></p>
</div>
<div class="m-b-2"> </div>
</div>
</article>
</div>
</section>
<section class="section p-t-2 p-b-2 blade-blockquote">
<div class="container">
<div style="color:#ffffff;">
<div class="row">
<div class="column-8">
<h4 class="cta-contact__title m-b-1" style="font-size:2rem">Contact Radware Sales</h4>
<p class="cta-contact__description">Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.</p>
</div>
<div class="column-3 offset-1">
<div class="cta-contact__button m-t-2"><a class="btn btn--action p-1 btn--inverse btn--block" data-rdwr-cta="button footer Contact Us Now" href="/contactus/">Contact Us Now</a></div>
</div>
</div>
</div>
</div>
</section>
<section class="section section--gradient-ease p-0">
<div class="section-overlay section-overlay--blades-left">
<div class="section-overlay section-overlay--blades-right">
<div class="container p-t-3 p-b-3 aos-init" data-aos="fade-up">
<div class="row">
<div class="column-6">
<h4 class="title title--size-s m-b-1">Already a Customer?</h4>
<p>We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.</p>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/locations/?utm_source=getstartedpage&utm_campaign=getstarted&utm_content=locations">Locations </a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="https://support.radware.com/?utm_source=getstartedpage&utm_campaign=getstarted&utm_content=knowledgebase" target="_blank">Get Answers Now from KnowledgeBase </a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/training/?utm_source=getstartedpage&utm_campaign=getstarted&utm_content=training">Get Free Online Product Training </a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/support/?utm_source=getstartedpage&utm_campaign=getstarted&utm_content=support">Engage with Radware Technical Support </a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="https://radware.customershome.com/home" target="_blank">Join the Radware Customer Program</a>
</div>
<div class="column-5 offset-1">
<h4 class="title title--size-s m-b-1">Get Social</h4>
<p>Connect with experts and join the conversation about Radware technologies.</p>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/blog/">Blog</a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/security" target="_self">Security Research Center</a><br>
<a class="link-external link-external--compact blade-bullet blade-bullet--size-s blade-bullet--inline m-b-1" href="/cyberpedia/" target="_self">CyberPedia</a><br>
<p class="m-t-1"><a class="link-external link-external--icon" href="https://www.facebook.com/Radware" target="_blank"><img src="/RadwareNext/images/social-icons/facebook.svg"> </a>
<a class="link-external link-external--icon" href="https://www.youtube.com/user/radwareinc" target="_blank"> <img src="/RadwareNext/images/social-icons/youtube.svg"> </a>
<a class="link-external link-external--icon" href="https://www.linkedin.com/company/radware" target="_blank"> <img src="/RadwareNext/images/social-icons/linkedin.svg"> </a>
<a class="link-external link-external--icon" href="https://twitter.com/radware" target="_blank"> <img src="/RadwareNext/images/social-icons/twitter.svg"> </a></p>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<!--End content-->
<section class="search-form search-form--closed js-search">
<div class="search-form__close js-search-close"><img src="/RadwareNext/images/icons/icon-close.svg" alt="Close">
</div>
<div class="row">
<div class="column-6 offset-3">
<h4 class="text-primary">What are you looking for?</h4>
<input type="text" name="term" class="form-control textsearchinput">
</div>
</div>
</section>
</form>
Text Content
* Support * Training * Online Services * Partners * Customers * Investor Relations * English (US) * Contact * Under Attack? * Application Protection * DDoS Protection * Public Cloud Protection * Application Delivery * Service Providers * Resources * Contact Under Attack? * THREAT ALERTS * Passion: A Russian Botnet PASSION: A RUSSIAN BOTNET -------------------------------------------------------------------------------- January 31, 2023 11:10 AM The Passion Botnet was leveraged during the attacks on January 27th, targeting medical institutions in the USA, Portugal, Spain, Germany, Poland, Finland, Norway, Netherlands, and the United Kingdom as retaliation for sending tanks in support of Ukraine. Read the Complete Alert Passion group, affiliated with Killnet and Anonymous Russia, recently began offering DDoS-as-a-Service to pro- Russian hacktivists. The Passion Botnet was leveraged during the attacks on January 27th, targeting medical institutions in the USA, Portugal, Spain, Germany, Poland, Finland, Norway, Netherlands, and the United Kingdom as retaliation for sending tanks in support of Ukraine. PASSION BOTNET The origins of the Passion group remain unknown, but they have made their presence known recently, especially since the start of the new year. The group has been associated with defacement and denial-of-service attacks targeting individuals and organizations who do not support the Russian invasion of Ukraine. Passion has a strong online presence through its Telegram channels, some dating back to March 2022. Other hacktivist groups, such as Anonymous Russia, MIRAI, Venom, and Killnet, have promoted Passion. The Passion group's tactics, techniques, and procedures (TTPs) resemble those of the other hacktivist groups involved in the Russo-Ukrainian conflict. After conducting a denial-of-service attack, the group typically posts a link to a check-host[.]net page as evidence of their success. DEFACEMENT CAMPAIGNS The group responsible for the Passion Botnet carried out several defacement attacks over the past month to spread their message and raise awareness. The defacements primarily targeted small organizations in Japan and South Africa. The group's objective appears to be to use these attacks to draw attention to their botnet. Figure 1: Passion Defacement left on the victim's website after a successful attack Hacktivists and defacement attacks can pose a serious risk to targeted organizations. They can significantly harm an organization's reputation, causing a loss of trust and credibility with customers and stakeholders. The attacks can escalate to theft or compromise of sensitive information by moving laterally across the infrastructure from the breached web server. The attacks lead to downtime and can disrupt critical business processes, resulting in higher operational costs and impacting the overall efficiency of an organization. Additionally, breaches can lead to financial losses and legal liabilities. The aftermath of these attacks can be challenging. It may take considerable time and resources to discover the full impact and all affected systems after a breach incident. It is essential for organizations to take proactive measures and have complete visibility in their hybrid infrastructure to detect and assess the impact of breaches and defacements. DDOS-AS-A-SERVICE The group behind the Passion Botnet is currently offering access to the service, for a fee, to pro-Russian hacktivists via several Telegram channels. Over the years, DDoS-as-a-Service became a standard tool for hacktivists because it allows those without the ability to build and manage a botnet to launch significantly larger and more impacting attacks. DDoS services are generally sold as a subscription-based model, allowing customers to choose their attack vectors, duration, and intensity. CONTINUE READING... Click here to read the full ERT Threat Alert. Read the full threat alert now CONTACT RADWARE SALES Our experts will answer your questions, assess your needs, and help you understand which products are best for your business. Contact Us Now ALREADY A CUSTOMER? We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions. Locations Get Answers Now from KnowledgeBase Get Free Online Product Training Engage with Radware Technical Support Join the Radware Customer Program GET SOCIAL Connect with experts and join the conversation about Radware technologies. Blog Security Research Center CyberPedia WHAT ARE YOU LOOKING FOR? SOLUTIONS * Cloud Application Protection Services * Application Protection for Any Cloud * Bot Management * API Protection * Client-Side Protection * On-Prem Application Delivery & Security FREE ASSESSMENT TOOLS * Business Impact Calculator * Bad Bot Analyzer * Bad Bot Vulnerability Scanner * Application Vulnerability Analyzer PRODUCTS & SERVICES * Cloud WAF Service * Bot Manager * API Protection * Client-Side Protection * Web DDoS Protection * Alteon Integrated WAF * Kubernetes WAF BY INDUSTRY * Healthcare * Financial Services * Open Banking * Education * SaaS * eCommerce * Government * Gaming SOLUTIONS * End-to-End DDoS Protection * Multi Layered DDoS Protection * Encrypted Attack Protection * Advanced Cloud Network Analytics * Cloud Firewall-as-a-Service PRODUCTS & SERVICES * Cloud DDoS Protection Service * Cloud Web DDoS Protection * DefensePro * Threat Intelligence * ERT Services * Cyber Controller BY INDUSTRY * Healthcare * Financial Services * Open Banking * Education * SaaS * eCommerce * Government * Gaming SOLUTIONS * End to End Public Cloud Protection * Application Protection for Any Cloud * Cloud Security Posture Management (CSPM) * Cloud Infrastructure Entitlement Management (CIEM) * Cloud Threat Detection & Response (CTDR) * Public Cloud Application Protection * Cross-Cloud Visibility & Reporting PRODUCTS & SERVICES * Cloud Native Protector * Kubernetes WAF * Bot Manager BY INDUSTRY * Healthcare * Financial Services * Open Banking * Education * SaaS * eCommerce * Government * Gaming SOLUTIONS * Application Delivery Across Hybrid Environments * Secured Application Delivery * SSL Inspection, Offloading and Acceleration PRODUCTS & SERVICES * Alteon * Alteon GEL * SSL Inspection * LinkProof NG * Cyber Controller BY INDUSTRY * Healthcare * Financial Services * Open Banking * Education * SaaS * eCommerce * Government * Gaming SOLUTIONS * DDoS Protection * 5G Protection Solution * Security Managed Services (MSSP) PRODUCTS & SERVICES * DefensePro * DefenseFlow * Cloud DDoS Peak Protection Service * Alteon * MSSP Portal * Cyber Controller DOCUMENTS * White Papers * Research * Case Study * Data Sheets * Solution Briefs * Infographics * Integration Guides * eGuides EVENTS * Webinars & Virtual Events * In Person Events * Expert Talk BLOG * Application Delivery * DDoS Protection * Application Protection * Threat Intelligence SOFTWARE DOWNLOADS * Alteon VA for Network Administrators * Alteon VA for Developers SECURITY RESEARCH CENTER * Threat Alerts * Live Threat Map * Security Research & Reports * CyberPedia FREE ASSESSMENT TOOLS * Business Impact Calculator * Bad Bot Analyzer * Bad Bot Vulnerability Scanner * Application Vulnerability Analyzer APPLICATION PROTECTION * Solutions * Cloud Application Protection Services * Application Protection for Any Cloud * Bot Management * API Protection * Client-Side Protection * On-Prem Application Delivery & Security * Products & Services * Cloud WAF Service * Bot Manager * API Protection * Client-Side Protection * Web DDoS Protection * Alteon Integrated WAF * Kubernetes WAF * Free Assessment Tools * Business Impact Calculator * Bad Bot Analyzer * Bad Bot Vulnerability Scanner * Application Vulnerability Analyzer DDOS PROTECTION * Solutions * End-to-End DDoS Protection * Multi Layered DDoS Protection * Encrypted Attack Protection * Advanced Cloud Network Analytics * Cloud Firewall-as-a-Service * Products & Services * Cloud DDoS Protection Service * Cloud Web DDoS Protection * DefensePro * Threat Intelligence * ERT Services * Cyber Controller PUBLIC CLOUD PROTECTION * Solutions * End to End Public Cloud Protection * Application Protection for Any Cloud * Cloud Security Posture Management (CSPM) * Cloud Infrastructure Entitlement Management (CIEM) * Cloud Threat Detection & Response (CTDR) * Public Cloud Application Protection * Cross-Cloud Visibility & Reporting * Products & Services * Cloud Native Protector * Kubernetes WAF * Bot Manager APPLICATION DELIVERY * Solutions * Application Delivery Across Hybrid Environments * Secured Application Delivery * SSL Inspection, Offloading and Acceleration * Products & Services * Alteon * Alteon GEL * SSL Inspection * LinkProof NG * Cyber Controller SERVICE PROVIDERS * Solutions * DDoS Protection * 5G Protection Solution * Security Managed Services (MSSP) * Products & Services * DefensePro * DefenseFlow * Cloud DDoS Peak Protection Service * Alteon * MSSP Portal * Cyber Controller BY INDUSTRY * By Industry * Healthcare * Financial Services * Open Banking * Education * SaaS * eCommerce * Government * Gaming RESOURCES & DOWNLOADS * Documents * White Papers * Research * Case Study * Data Sheets * Solution Briefs * Infographics * Integration Guides * eGuides * Software Downloads * Alteon VA for Network Administrators * Alteon VA for Developers * Security Research Center * Threat Alerts * Live Threat Map * Security Research & Reports * CyberPedia * Blog * Application Delivery * DDoS Protection * Application Protection * Threat Intelligence SUPPORT * Support * Support Service & Knowledgebase * Open A Support Case * My Support Cases * Password Generator * License Generator * Support & Global Phone Contacts * Certainty Support Program * Customer Support Forum TRAINING & PROFESSIONAL SERVICES * Training * Learning Academy * Professional Services * Professional Services Offering INVESTOR RELATIONS * Investor Relations * Financial Info * Stock Info * Investor Events * Press Releases * Company ABOUT * Management * Executive Management * Board Members * Partners * Find a Partner * Become a Partner * Deal Registration * Technology Partners * Careers * The Americas (North & South) * EMEA (Europe, Middle East, & Africa) * APAC (Asia Pacific) * Israel (International Headquarters) * Locations * The Americas * Europe - Middle East - Africa * Asia Pacific NEWS ROOM * News Room * Press Releases * Media Coverage * Events & Webcasts * Certifications * Media Kit CONTACT US * Contact Us * Locations ABOUT RADWARE * Customers * Partners * Investor Relations * Diversity & Inclusion * Corporate Responsibility * Careers * Locations * Contact Us ONLINE SERVICES * Support * Training * Portals * Cloud Services Portal * Support Forum * Knowledge Base * Professional Services NEWS ROOM * Press Releases * Media Coverage * Digital Events * In Person Events * Awards * Certifications * Media Kit ENGAGE WITH US * Blog * Live Threat Map * Expert Talk © Copyright 2023 Radware – All Rights Reserved. * Sitemap * Privacy Policy * Site Feedback * Terms of Use * Legal Notice * Accessibility Statement * Cookie-Präferenzen Privacy Policy | Terms of Use | Legal Notice LOCAL WEBSITES × * English (US) * Chinese * Korean * German * French * Russian * Japanese * Spanish