<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:webfeeds="http://webfeeds.org/rss/1.0">
    <channel>
        <title><![CDATA[Radware Link Community]]></title>
        <description><![CDATA[Radware Link Community]]></description>
        <link>https://radware-community.customershome.com</link>
        <image>
            <url>https://tribe-s3-production.imgix.net/OXm89rWwAKdG70LO5Y8Wc?fit=max&amp;w=500&amp;auto=compress,format</url>
            <title>Radware Link Community</title>
            <link>https://radware-community.customershome.com</link>
        </image>
        <generator>Bettermode RSS Generator</generator>
        <lastBuildDate>Tue, 12 May 2026 11:03:58 GMT</lastBuildDate>
        <atom:link href="https://radware-community.customershome.com/rss/feed" rel="self" type="application/rss+xml"/>
        <pubDate>Tue, 12 May 2026 11:03:58 GMT</pubDate>
        <copyright><![CDATA[2026 Radware Link Community]]></copyright>
        <language><![CDATA[en-US]]></language>
        <ttl>60</ttl>
        <webfeeds:icon>https://tribe-s3-production.imgix.net/OXm89rWwAKdG70LO5Y8Wc?fit=max&amp;w=500&amp;auto=compress,format</webfeeds:icon>
        <webfeeds:related layout="card" target="browser"/>
        <item>
            <title><![CDATA[deploy Defensepro on Asymmetric Network]]></title>
            <description><![CDATA[I'm preparing to deploy Defensepro devices to our network, but I have a few questions and need expert advice and accurate information about Radware's DDoS protection solution.

Our network model is ...]]></description>
            <link>https://radware-community.customershome.com/ddos-protection-ibotkkf5/post/deploy-defensepro-on-asymmetric-network-qVzFKZ51Azup0eE</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/ddos-protection-ibotkkf5/post/deploy-defensepro-on-asymmetric-network-qVzFKZ51Azup0eE</guid>
            <category><![CDATA[Asymmetric, DefensePro]]></category>
            <dc:creator><![CDATA[Pham Hung]]></dc:creator>
            <pubDate>Thu, 07 May 2026 09:02:22 GMT</pubDate>
            <content:encoded><![CDATA[<p></p><figure data-align="center" data-size="best-fit" data-id="miXnm8RpxhO9NQh0TuxsF" data-version="v2" data-type="image"><img data-id="miXnm8RpxhO9NQh0TuxsF" src="https://tribe-s3-production.imgix.net/miXnm8RpxhO9NQh0TuxsF?auto=compress,format"></figure><p>I'm preparing to deploy Defensepro devices to our network, but I have a few questions and need expert advice and accurate information about Radware's DDoS protection solution.</p><p>Our network model is shown in the attached image, including two ISPs, and we use BGP to redirect traffic. We plan to place two Defensepro devices on two separate lines. However, because we use iBGP, there might be cases where connections enter one line and exit through the other. Therefore, please help me determine the optimal placement of the two DDoS protection devices and whether asymmetrical traffic will be dropped by the DDoS devices.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Linker Pulse: API keys got new permissions after enabling AI. No one noticed.]]></title>
            <description><![CDATA[I came across this article:
https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html [https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html]

Short version:

Teams had API keys in their code. Mostly for simple things like billing or basic ...]]></description>
            <link>https://radware-community.customershome.com/application-protection-f91x3tln/post/linker-pulse-api-keys-got-new-permissions-after-enabling-ai-no-one-kXCoFgIZXAEyPq2</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/application-protection-f91x3tln/post/linker-pulse-api-keys-got-new-permissions-after-enabling-ai-no-one-kXCoFgIZXAEyPq2</guid>
            <dc:creator><![CDATA[Sharon Levin]]></dc:creator>
            <pubDate>Mon, 04 May 2026 08:25:09 GMT</pubDate>
            <content:encoded><![CDATA[<p>I came across this article:<br><a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html">https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html</a></p><p>Short version:</p><p>Teams had API keys in their code. Mostly for simple things like billing or basic services .Then they enabled Gemini API.</p><p>Using the same keys.</p><p>But now they could:</p><ul><li><p>Access new endpoints</p></li><li><p>Interact with AI services</p></li><li><p>Reach data they were not meant to</p></li><li><p>Generate unexpected costs</p></li></ul><p>No exploit.<br>No code broken. Just a change in behavior.</p><p>What’s interesting here is not the AI itself.</p><p>It’s the assumption: “this key is not sensitive”</p><p>That assumption changed.<br>But the controls didn’t.</p><p>This is very close to what we see in application logic issues:</p><ul><li><p>permissions that grow over time</p></li><li><p>APIs that behave differently after changes</p></li><li><p>things that are “technically allowed” but shouldn’t happen</p></li></ul><p>We put together a quick poll to understand how people handle this in real environments:<br>👉 [<a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://radware.customershome.com//challenge-broadcast/0A703DA2-77CF-489A-8D0E-8F65A5522C34">Link to poll</a>]</p><p>We’ll share the results here once we collect enough responses.</p><p>Curious to hear how you approach this today.</p><p></p><p>Stay safe and proactive</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Mitigate advanced cyberattacks in real time]]></title>
            <description><![CDATA[How can Radware solutions help detect and mitigate advanced cyberattacks in real time?]]></description>
            <link>https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/mitigate-advanced-cyberattacks-in-real-time-PqgpOzzq946bGj6</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/mitigate-advanced-cyberattacks-in-real-time-PqgpOzzq946bGj6</guid>
            <category><![CDATA[DDoS Protection]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Zero Day Attack]]></category>
            <dc:creator><![CDATA[Sandeep Yadav]]></dc:creator>
            <pubDate>Thu, 30 Apr 2026 02:13:58 GMT</pubDate>
            <content:encoded><![CDATA[<p>How can Radware solutions help detect and mitigate advanced cyberattacks in real time?</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[INGENIERA EN SISTEMAS]]></title>
            <link>https://radware-community.customershome.com/cybersecurity-career-paths-yqyb1qba/post/ingeniera-en-sistemas-uRyiME0gygG2udO</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/cybersecurity-career-paths-yqyb1qba/post/ingeniera-en-sistemas-uRyiME0gygG2udO</guid>
            <dc:creator><![CDATA[Yandry Daniela Torres de Moya]]></dc:creator>
            <pubDate>Wed, 29 Apr 2026 20:46:57 GMT</pubDate>
            <content:encoded/>
        </item>
        <item>
            <title><![CDATA[MISS]]></title>
            <link>https://radware-community.customershome.com/cybersecurity-career-paths-yqyb1qba/post/miss-FjZW5G0YwW7ManK</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/cybersecurity-career-paths-yqyb1qba/post/miss-FjZW5G0YwW7ManK</guid>
            <dc:creator><![CDATA[SANDRA BERMUDEZ]]></dc:creator>
            <pubDate>Wed, 29 Apr 2026 04:24:39 GMT</pubDate>
            <content:encoded/>
        </item>
        <item>
            <title><![CDATA[Inside the $1.5B Heist: A Special Webinar with Investigative Journalist Geoff White]]></title>
            <description><![CDATA[Hi,

Whenever we talk about major breaches, we usually imagine hackers finding a bug in the code or a hole in the firewall. But this time, I want to invite you to dive into something completely ...]]></description>
            <link>https://radware-community.customershome.com/application-protection-f91x3tln/post/inside-the-1-5b-heist-a-special-webinar-with-investigative-journalist-jfLu6m31SS5ufza</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/application-protection-f91x3tln/post/inside-the-1-5b-heist-a-special-webinar-with-investigative-journalist-jfLu6m31SS5ufza</guid>
            <dc:creator><![CDATA[Sharon Levin]]></dc:creator>
            <pubDate>Thu, 23 Apr 2026 14:10:30 GMT</pubDate>
            <content:encoded><![CDATA[<p>Hi,</p><p>Whenever we talk about major breaches, we usually imagine hackers finding a bug in the code or a hole in the firewall. But this time, I want to invite you to dive into something completely different—an angle we haven't really explored at Radware until now.</p><p>Think about this: <strong>$1.5 billion stolen in 156 seconds.</strong> Without breaking a single line of code.</p><p>How? The Lazarus Group didn’t look for a technical flaw. They simply understood how the business worked—and used that business logic against the organization. It’s scary because it means the vulnerability isn’t in our firewall, but in the way we built our processes.</p><p>We’ve invited investigative journalist Geoff White and our own Uri Dorot for a 30-minute conversation. They are going to "deconstruct" the Bybit heist and explain exactly why the defenses most of us build simply wouldn’t have stopped it.</p><p>This isn’t a sales pitch. It’s a journey into the adversary’s mind to understand where we are truly exposed.</p><p><strong>I’ll be there, and I’d love for you to join us: </strong><a href="https://www.brighttalk.com/webcast/18348/666656" rel="noopener noreferrer nofollow" class="text-interactive hover:text-interactive-hovered">Click </a><strong>to register.</strong></p><p></p><p><strong>Sharon.</strong></p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[[The Linkers Pulse] The $285 Million Handshake: When the Breach is in the Mind, Not the Code]]></title>
            <description><![CDATA[THE STORY

Have you caught the news [https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html]? $285 million stolen in just 12 minutes. But the real horror isn’t the speed, it’s the fact that the attack didn’t start with a technical hack. It started six months...]]></description>
            <link>https://radware-community.customershome.com/application-protection-f91x3tln/post/the-linkers-pulse-the-285-million-handshake-when-the-breach-is-in-the-MpDAEx6nZCyaC7q</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/application-protection-f91x3tln/post/the-linkers-pulse-the-285-million-handshake-when-the-breach-is-in-the-MpDAEx6nZCyaC7q</guid>
            <dc:creator><![CDATA[Sharon Levin]]></dc:creator>
            <pubDate>Thu, 09 Apr 2026 13:24:19 GMT</pubDate>
            <content:encoded><![CDATA[<h2 class="text-xl" data-toc-id="bb276262-cedc-4082-9ce3-9c3b4f886a18" id="bb276262-cedc-4082-9ce3-9c3b4f886a18"><strong>The Story</strong></h2><p> Have you caught the <a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html">news</a>? $285 million stolen in just 12 minutes. But the real horror isn’t the speed, it’s the fact that the attack didn’t start with a technical hack. It started six months earlier, at a crypto conference, with a handshake.</p><p><strong>While we’re all busy looking for sophisticated bots or AI-generated code vulnerabilities, North Korean hackers (UNC4736) went back to basics: building relationships.</strong> </p><p>They realized it’s much easier to "hack" a human than it is to hack a system. This was incredibly sophisticated "Low-Tech": they sent actual people to industry events, deposited $1 million of their own money to build credibility, and spent months in Telegram groups having substantive professional conversations. They didn't look for a "hole" in the code; they simply manipulated authorized users into changing security rules and removing critical protections like the time-lock for them.</p><p></p><h2 class="text-xl" data-toc-id="bf33d42f-58c8-4d0e-80fa-c4e973055f41" id="bf33d42f-58c8-4d0e-80fa-c4e973055f41"><strong>The Insight</strong> </h2><p>This story reminds us that security has many faces, and the threat has shifted from "systems" to "minds." Powerful technology is critical, but it must work hand-in-hand with human alertness and systems designed to prevent "human factor" errors.</p><p></p><h2 class="text-xl" data-toc-id="d04e2b52-9f6f-409c-ab95-c1311783be37" id="d04e2b52-9f6f-409c-ab95-c1311783be37"><strong>The Question</strong> </h2><p>Social engineering like this exploits our most valuable asset - trust. If you were in the shoes of the security team at Drift, how do you think you could have defended against or prevented an attack that begins with a simple handshake?</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Level Up Your AppSec: You're Invited to Our Exclusive Masterclass in Rome]]></title>
            <description><![CDATA[Hi Linkers,

I want to invite you to an exclusive Masterclass designed for those of us facing the daily challenges of digital protection in an ever-evolving world. As part of our Radware University ...]]></description>
            <link>https://radware-community.customershome.com/application-protection-f91x3tln/post/level-up-your-appsec-you-re-invited-to-our-exclusive-masterclass-in-rome-s60jEvddNG3Dqym</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/application-protection-f91x3tln/post/level-up-your-appsec-you-re-invited-to-our-exclusive-masterclass-in-rome-s60jEvddNG3Dqym</guid>
            <dc:creator><![CDATA[Ariane Masseboeuf]]></dc:creator>
            <pubDate>Thu, 09 Apr 2026 06:31:26 GMT</pubDate>
            <content:encoded><![CDATA[<p><strong>Hi Linkers,</strong></p><p>I want to invite you to an exclusive Masterclass designed for those of us facing the daily challenges of digital protection in an ever-evolving world. As part of our Radware University initiative, we’re hosting a deep dive into AppSec—a critical element in keeping our digital ecosystems secure.</p><p><strong>The Details:</strong> We’re meeting on <strong>Thursday, June 11, 2026</strong>, at the <strong>Cardo Hotel</strong> in Rome (Viale del Pattinaggio, 100).</p><p><strong>Why join us?</strong> The massive shift to the cloud and expanding attack surfaces mean we need a new level of focus on AppSec. This session isn't just about theory; it’s about sharing strategies and best practices to defend applications and APIs from advanced threats.</p><p><strong>What we’ll cover:</strong></p><ul><li><p><strong>AppSec Threat Landscape:</strong> A look at emerging threats and how AI is fundamentally changing application security.</p></li><li><p><strong>360° Protection Model:</strong> A deep dive into WAAP, Bot Management, Client-Side Protection, and Web DDoS Protection.</p></li><li><p><strong>API Security:</strong> Since APIs are now integral to exposed web apps, we’ll focus on understanding their vulnerabilities and how to protect them.</p></li><li><p><strong>Interactive Workshop:</strong> Hands-on technical exercises and real-world scenarios to build operational skills.</p></li></ul><p><strong>Who should attend?</strong> This is for the pros—Cybersecurity professionals, IT managers, network architects, security analysts, and sales engineers who want to stay ahead of the curve.</p><p><strong>I’d love to see you there.</strong> To secure your spot, please register by <strong>May 29, 2026</strong>.</p><p><strong>Click here to sign up: [</strong><a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://gbl.radware.com/2026_AppSec-Masterclass_June_Roma?utm_source=https%3A%2F%2Fradware-community.customershome.com%2F">Link</a><strong>]</strong></p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Agentic AI Is Moving Fast — Here’s what the community cays you should know]]></title>
            <description><![CDATA[Agentic applications are evolving at breakneck speed, and the global security community is already mapping out the risks that come with this new level of autonomy.

What the Community Says

OWASP — the ...]]></description>
            <link>https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/agentic-ai-is-moving-fast----here-s-what-the-community-cays-you-should-know-gLhyzLyq24VmFfp</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/agentic-ai-is-moving-fast----here-s-what-the-community-cays-you-should-know-gLhyzLyq24VmFfp</guid>
            <dc:creator><![CDATA[Sharon Levin]]></dc:creator>
            <pubDate>Sun, 05 Apr 2026 08:49:58 GMT</pubDate>
            <content:encoded><![CDATA[<p>Agentic applications are evolving at breakneck speed, and the global security community is already mapping out the risks that come with this new level of autonomy.</p><p><strong>What the Community Says</strong></p><p>OWASP — the leading global authority on application security — recently published the <strong>OWASP Top 10 for Agentic Applications (2026)</strong>, outlining the ten most critical risks associated with autonomous AI systems. This list is built by a worldwide network of security experts, researchers, and industry contributors, and is quickly becoming a cornerstone reference in the field. If you’d like to dive deeper into the community-driven source itself:<br><a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/"><strong>https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/</strong></a></p><h3 class="text-lg" data-toc-id="9faedb2a-65ff-45fc-ac13-735befe0beaa" id="9faedb2a-65ff-45fc-ac13-735befe0beaa"> What Radware Adds</h3><p>While OWASP maps out the <em>risks</em>, at <strong>Radware</strong> we focused on the practical side:<br><strong>How do you actually survive these risks?</strong></p><p>In our new guide,<a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://www.radware.com/getattachment/93459258-27ec-4717-a0e7-48b2dc9ce777/Radware_OWASP-Top-10_Guide_2026_RWI6-310.pdf.aspx"> How to Survive the OWASP Top Ten for Agentic Applications</a>, we break down each key risk and translate it into real‑world, actionable defense strategies:</p><p>✅ How attackers already exploit agentic systems<br>✅ What real misuse looks like in production environments<br>✅ How to detect, mitigate, and block these threats in real time</p><p>Our goal is to help teams understand not just <em>what</em> the risks are — but <em>what to do next</em>.</p><h3 class="text-lg" data-toc-id="7770340f-c594-47f0-8784-7f79f30c1f26" id="7770340f-c594-47f0-8784-7f79f30c1f26">What’s Next?</h3><p>If you're working with AI agents, experimenting with agentic workflows, or building autonomous capabilities:</p><p>🔹 Read what the community is saying to get the full landscape<br>🔹 Read our guide to learn how to defend against these threats effectively</p><p><strong>And don’t hesitate to ask questions.<br>This domain is evolving daily, and we all benefit from sharing knowledge, challenges, and hands‑on experience.</strong></p><p>Let’s build safer, smarter agentic AI — together. 🌟</p><p></p><p>Stay safe and proactive.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Why "Agentic" AI is a Different Kind of Risk]]></title>
            <description><![CDATA[Hi,

The transition from "chatting" with AI to letting AI "act" is a massive leap in productivity—but it also changes the rules of security.

I recently published a blog that captures this shift. ...]]></description>
            <link>https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/why-agentic-ai-is-a-different-kind-of-risk-KFm4rkT3p0Ps5PP</link>
            <guid isPermaLink="true">https://radware-community.customershome.com/ai-protection-discusstions-nyhat5bz/post/why-agentic-ai-is-a-different-kind-of-risk-KFm4rkT3p0Ps5PP</guid>
            <dc:creator><![CDATA[Dror Zelber (Radware Staff)]]></dc:creator>
            <pubDate>Sun, 05 Apr 2026 07:15:58 GMT</pubDate>
            <content:encoded><![CDATA[<p>Hi,</p><p>The transition from "chatting" with AI to letting AI "act" is a massive leap in productivity—but it also changes the rules of security.</p><p>I recently published a blog that captures this shift. Traditional LLMs are like advisors; they give you information, and you decide what to do with it. Agentic AI, however, is like an intern with a set of keys. It can browse the web, access APIs, and execute tasks autonomously.</p><p>The risk isn't just about the AI being "smarter"—it's about the <strong>Autonomy Risk</strong>. When an agent can make decisions without a human in the loop for every step, a single prompt injection or a flawed instruction can lead to real-world actions that are hard to undo.</p><p><a class="text-interactive hover:text-interactive-hovered" rel="noopener noreferrer nofollow" href="https://www.radware.com/blog/why-agentic-ai-is-more-dangerous-than-traditional-llms/">Read my blog.</a></p><p>Dror</p>]]></content:encoded>
        </item>
    </channel>
</rss>