Latest news with #PascalGeenens


Scoop
26-06-2025
- Business
- Scoop
Ceasefire Holds, But Experts Warn Cyber Tensions Between Iran And The West May Be Far From Over
As a U.S.-brokered ceasefire between Israel and Iran holds for now, cybersecurity experts are urging vigilance—noting that while military activity may have paused, cyber tensions are likely to continue simmering beneath the surface. 'In light of recent developments, the likelihood of disruptive cyberattacks against U.S. targets by Iranian actors has increased,' said John Hultquist, chief analyst at Google's Threat Intelligence Group. 'Iran already targets the U.S. with cyberespionage… and individuals associated with Iran policy should be on the lookout for social engineering schemes.' A new report from cybersecurity firm Radware adds weight to those concerns, warning that the Israel-Iran conflict has seen an evolution into a hybrid war that includes cyberspace. According to their latest advisory: Nearly 40% of global DDoS activity recently targeted Israel, with signs of spillover affecting the U.S., U.K., and Jordan. Hacker groups such as DieNet, Arabian Ghosts, and Sylhet Gang have issued warnings or taken credit for attacks, some aimed at Western nations. AI-generated disinformation and deepfakes have appeared across digital platforms, contributing to confusion and information warfare. 'Critical infrastructure, supply chains, and global businesses could become collateral targets if cyber tensions escalate further,' said Pascal Geenens, Director of Threat Intelligence at Radware. 'The Israel-Iran conflict of 2025 is a stark illustration of how modern hybrid warfare plays out online as much as in the real world.' While the ceasefire has reduced the immediate risk of open military confrontation, experts believe that cyberspace may remain a domain for ongoing friction—especially as cyber operations allow for plausible deniability and targeted disruption. Hultquist cautioned that while Iranian cyber operations may sometimes exaggerate their impact, the risk for individual organisations remains serious. 'We should be careful not to overestimate these incidents and inadvertently assist the actors,' he said. 'The impacts may still be very serious for individual enterprises, which can prepare by taking many of the same steps they would to prevent ransomware.' For now, the digital front may be quiet—but beneath the surface, it's likely that espionage and influence operations are still underway.

Yahoo
26-02-2025
- Business
- Yahoo
Radware report reveals sharp rise in global cyber threats
-- Radware Ltd (NASDAQ:RDWR), a provider of application security and delivery solutions, has unveiled its 2025 Global Threat Analysis Report, detailing a significant escalation in cyber threats worldwide. The report is based on data from network and application attack activity in 2024, sourced from Radware's cloud services, managed services, and threat intelligence research, as well as information from the messaging platform Telegram. Key findings from the report indicate a 37% increase in the average duration of network DDoS attacks over the previous year, with North America facing the brunt of web application and API attacks, accounting for 66% of the total. The finance and transportation sectors saw a nearly 400% year-over-year growth in DDoS attack volume. Furthermore, hacktivist claims rose by 20% globally, with governments being the most frequent targets. The report links the increase in Layer 7 (L7) Web DDoS attacks to hacktivist groups, which are motivated by geopolitical tensions and have access to increasingly sophisticated tools. These attacks surged by 550% compared to 2023, with the EMEA region being the primary target. Network-layer DDoS attacks also grew in volume, frequency, and duration, more than doubling since 2022. The average mitigated attack volume rose by 120% compared to the previous year. Europe faced the highest proportion of network DDoS activity, followed by North America. The telecommunications industry bore 43% of the global network DDoS attack volume, with finance following at 30%. The financial sector experienced the steepest growth in attack volume per organization, increasing by 393% year-over-year. Hacktivist campaigns intensified, with Ukraine and Israel being the most targeted nations. Government institutions were the top hacktivist targets, followed by business services, finance, and transportation. The most prolific threat actor was a pro-Russian hacker, claiming 4,767 DDoS attacks. Web applications and APIs have become prime targets for exploitation, with attacks climbing by 41% compared to 2023. Vulnerability exploitation remained the most prominent attack type. Pascal Geenens, director of threat intelligence at Radware, emphasized the need for dynamic defense strategies, stating, "The escalations in the threat landscape have significant implications for every sector... Organizations are operating in a dynamic environment that demands equally dynamic defense strategies." Related Articles Radware report reveals sharp rise in global cyber threats IRS Chief Operating Officer Krause to become acting commissioner Roberta Flack, American singer and Grammy winner, dies aged 88