Radware reports significant rise in cyberattacks in APAC, highlighting increased DDoS volumes and hacktivist activity from 2023 to 2024.
Quiver AI Summary
Radware has released a press release detailing a significant increase in cyber activity across the APAC region between 2023 and 2024, based on their threat intelligence data. Key findings indicate that average mitigated DDoS attack volumes rose by 364%, with a 93% increase in DNS flood queries. Government institutions and the education sector were the primary targets for hacktivist attacks, which grew by 20% globally. The report highlights the complex and evolving nature of cyber threats, driven by geopolitical tensions, advanced adversaries, and the impact of AI, necessitating robust defense strategies. Radware emphasizes the importance of understanding these trends, as outlined in their upcoming 2025 Global Threat Analysis Report.
Potential Positives
- Radware’s release of significant threat intelligence findings highlights their expertise in cybersecurity, reinforcing their position as a leader in application security solutions.
- The reported 364% rise in mitigated DDoS attack volumes emphasizes the increasing demand for advanced security solutions, potentially driving future business growth for Radware.
- The rise in cyber activity across the APAC region reflects a growing market for Radware's services, presenting opportunities for expansion and increased relevance in addressing evolving cybersecurity challenges.
Potential Negatives
- The significant rise in DDoS attack volumes and cyber activity in the APAC region may indicate vulnerabilities in Radware's security solutions, potentially damaging the company's reputation as a leader in application security.
- Radware's reliance on independent distributors and its ability to manage growth effectively may face challenges due to the intense competition in the cybersecurity market, which could impact its market share.
- The warning about increased risks associated with AI technologies and their potential regulatory impacts suggests that Radware faces rising operational risks that could affect future performance.
FAQ
What are Radware's latest threat intelligence findings?
Radware's findings reveal a significant rise in cyber activity in the APAC region, including a 364% increase in average mitigated DDoS attack volumes.
How did DDoS attack volumes change from 2023 to 2024?
The average mitigated DDoS attack volume climbed 364% between 2023 and 2024, indicating a substantial increase in threat levels.
Which sectors are most targeted by cyberattacks in APAC?
Government institutions and education were top targets for cyberattacks, with service providers suffering 55% of network DDoS attack volume.
What drove the increase in hacktivist activity in 2024?
Political and ideological tensions, coupled with a surge in retaliatory actions, fueled a 20% increase in hacktivist-claimed DDoS attacks globally.
Where can I find Radware's Global Threat Analysis Report?
Radware's new 2025 Global Threat Analysis Report is available on the Radware website, providing a comprehensive view of the threat landscape.
Disclaimer: This is an AI-generated summary of a press release distributed by GlobeNewswire. The model used to summarize this release may make mistakes. See the full release here.
$RDWR Hedge Fund Activity
We have seen 43 institutional investors add shares of $RDWR stock to their portfolio, and 78 decrease their positions in their most recent quarter.
Here are some of the largest recent moves:
- PENSERRA CAPITAL MANAGEMENT LLC added 2,885,913 shares (+inf%) to their portfolio in Q2 2025, for an estimated $84,961,278
- PHOENIX FINANCIAL LTD. removed 436,668 shares (-79.9%) from their portfolio in Q2 2025, for an estimated $12,855,505
- MILLENNIUM MANAGEMENT LLC removed 234,791 shares (-38.3%) from their portfolio in Q1 2025, for an estimated $5,076,181
- FIRST TRUST ADVISORS LP added 229,985 shares (+26.1%) to their portfolio in Q1 2025, for an estimated $4,972,275
- MORGAN STANLEY added 193,797 shares (+7.8%) to their portfolio in Q1 2025, for an estimated $4,189,891
- BANK OF AMERICA CORP /DE/ added 177,989 shares (+15807.2%) to their portfolio in Q1 2025, for an estimated $3,848,122
- LEGAL & GENERAL GROUP PLC added 150,556 shares (+6.7%) to their portfolio in Q1 2025, for an estimated $3,255,020
To track hedge funds' stock portfolios, check out Quiver Quantitative's institutional holdings dashboard.
$RDWR Analyst Ratings
Wall Street analysts have issued reports on $RDWR in the last several months. We have seen 1 firms issue buy ratings on the stock, and 0 firms issue sell ratings.
Here are some recent analyst ratings:
- Barclays issued a "Overweight" rating on 07/31/2025
To track analyst ratings and price targets for $RDWR, check out Quiver Quantitative's $RDWR forecast page.
$RDWR Price Targets
Multiple analysts have issued price targets for $RDWR recently. We have seen 2 analysts offer price targets for $RDWR in the last 6 months, with a median target of $32.5.
Here are some recent targets:
- Tavy Rosner from Barclays set a target price of $35.0 on 07/31/2025
- Joseph Gallo from Jefferies set a target price of $30.0 on 07/24/2025
Full Release
TOKYO, Aug. 07, 2025 (GLOBE NEWSWIRE) -- Radware ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, released threat intelligence findings that offer a year-over-year look at the rise in cyber activity in the APAC region.
Radware’s threat intelligence is based on 2024 network and application attack activity sourced from the company’s cloud and managed services, and threat intelligence research team. In addition, it draws from information found on Telegram, a public messaging platform often used by cybercriminals.
Key findings
Between 2023 and 2024 in APAC:
- Average mitigated DDoS attack volumes rose 364%.
- The number of DNS flood queries rose 93%.
-
Government institutions were the top hacktivist targets, followed by education.
“Across APAC, there has been a sharp escalation in the frequency and intensity of cyberattacks and DDoS incidents are leading the charge,” said Kenichiro Sasaki, Radware’s county manager in Japan. “Multiple catalysts are driving the threat revolution, including geopolitical conflicts, bigger and more complex threat surfaces, and more sophisticated and persistent threats. Add to that the impact of AI, which is lowering barriers to entry, and what you have is a highly dynamic threat environment that demands equally dynamic defense strategies.”
Network-layer DDoS attacks grow three times bigger
In 2024, network DDoS attack activity and intensity witnessed a significant uptick in APAC. According to Radware’s threat intelligence:
- Attack activity : The average number of DDoS attacks per customer increased 72% compared to 2023.
- Attack volume: The average mitigated DDoS attack volume climbed 364% over 2023.
-
Industry targets
: Services providers bore 55% of the network DDoS attack volume, followed by technology at 21% and gaming at 11%.
Application-layer DNS DDoS attacks post major gains
Last year was a pivotal year in the global evolution of Layer 7 DNS DDoS attacks. During 2024 in APAC:
- Attack activity: The number of DNS flood queries rose 93% compared to 2023.
- Attack volume: Malicious DNS volume increased 93% over 2023.
-
Industry targets:
The manufacturing sector accounted for 43% of malicious DNS Query Flood activity. Telecom (40%) ranked second, followed by energy (14%).
Hacktivist campaigns intensify, marked by retaliation and disruption
Propelled by political and ideological tensions, hacktivism remained a leading driver of cyberattacks. On a global basis, the total number of hacktivist-claimed DDoS attacks increased by 20% between 2023 and 2204, according to data gathered from Telegram.
Across APAC, 2024 Telegram data revealed:
- Geographic targets: The top targeted country was India with 761 claimed attacks, followed by Indonesia (614), Taiwan (281), Thailand (220), and Bangladesh (188).
- Industry targets: Government institutions were the top hacktivist targets, accounting for 17% of hacktivist activity, followed by education (12%) and finance (9%).
-
Top claiming actors:
Executor DDoS was the most prolific threat actor with 513 claimed DDoS attacks, followed by RipperSec (467), and NoName057(16) (362).
A comprehensive global view of the threat landscape can be found in Radware’s new 2025 Global Threat Analysis Report .
About Radware
Radware
®
(NASDAQ: RDWR) is a global leader in application security and delivery solutions for multi-cloud environments. The company’s cloud application, infrastructure, and API security solutions use AI-driven algorithms for precise, hands-free, real-time protection from the most sophisticated web, application, and DDoS attacks, API abuse, and bad bots. Enterprises and carriers worldwide rely on Radware’s solutions to address evolving cybersecurity challenges and protect their brands and business operations while reducing costs. For more information, please visit the
Radware
website.
Radware encourages you to join our community and follow us on: Facebook , LinkedIn , Radware Blog , X , and YouTube .
©2025 Radware Ltd. All rights reserved. Any Radware products and solutions mentioned in this press release are protected by trademarks, patents, and pending patent applications of Radware in the U.S. and other countries. For more details, please see: https://www.radware.com/LegalNotice/ . All other trademarks and names are property of their respective owners.
THIS PRESS RELEASE AND THE RADWARE 2025 GLOBAL THREAT ANALYSIS REPORT ARE PROVIDED FOR INFORMATIONAL PURPOSES ONLY. THESE MATERIALS ARE NOT INTENDED TO BE AN INDICATOR OF RADWARE'S BUSINESS PERFORMANCE OR OPERATING RESULTS FOR ANY PRIOR, CURRENT, OR FUTURE PERIOD.
Radware believes the information in this document is accurate in all material respects as of its publication date. However, the information is provided without any express, statutory, or implied warranties and is subject to change without notice.
The contents of any website or hyperlinks mentioned in this press release are for informational purposes and the contents thereof are not part of this press release.
Safe Harbor Statement
This press release includes “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements made herein that are not statements of historical fact, including statements about Radware’s plans, outlook, beliefs, or opinions, are forward-looking statements. Generally, forward-looking statements may be identified by words such as “believes,” “expects,” “anticipates,” “intends,” “estimates,” “plans,” and similar expressions or future or conditional verbs such as “will,” “should,” “would,” “may,” and “could.” For example, when we say in this press release that the impact of AI, which is lowering barriers to entry, causes a highly dynamic threat environment, we are using forward-looking statements. Because such statements deal with future events, they are subject to various risks and uncertainties, and actual results, expressed or implied by such forward-looking statements, could differ materially from Radware’s current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions, including as a result of the state of war declared in Israel in October 2023 and instability in the Middle East, the war in Ukraine, tensions between China and Taiwan, financial and credit market fluctuations (including elevated interest rates), impacts from tariffs or other trade restrictions, inflation, and the potential for regional or global recessions; our dependence on independent distributors to sell our products; our ability to manage our anticipated growth effectively; our business may be affected by sanctions, export controls, and similar measures, targeting Russia and other countries and territories, as well as other responses to Russia’s military conflict in Ukraine, including indefinite suspension of operations in Russia and dealings with Russian entities by many multi-national businesses across a variety of industries; the ability of vendors to provide our hardware platforms and components for the manufacture of our products; our ability to attract, train, and retain highly qualified personnel; intense competition in the market for cybersecurity and application delivery solutions and in our industry in general, and changes in the competitive landscape; our ability to develop new solutions and enhance existing solutions; the impact to our reputation and business in the event of real or perceived shortcomings, defects, or vulnerabilities in our solutions, if our end-users experience security breaches, or if our information technology systems and data, or those of our service providers and other contractors, are compromised by cyber-attackers or other malicious actors or by a critical system failure; our use of AI technologies that present regulatory, litigation, and reputational risks; risks related to the fact that our products must interoperate with operating systems, software applications and hardware that are developed by others; outages, interruptions, or delays in hosting services; the risks associated with our global operations, such as difficulties and costs of staffing and managing foreign operations, compliance costs arising from host country laws or regulations, partial or total expropriation, export duties and quotas, local tax exposure, economic or political instability, including as a result of insurrection, war, natural disasters, and major environmental, climate, or public health concerns; our net losses in the past and the possibility that we may incur losses in the future; a slowdown in the growth of the cybersecurity and application delivery solutions market or in the development of the market for our cloud-based solutions; long sales cycles for our solutions; risks and uncertainties relating to acquisitions or other investments; risks associated with doing business in countries with a history of corruption or with foreign governments; changes in foreign currency exchange rates; risks associated with undetected defects or errors in our products; our ability to protect our proprietary technology; intellectual property infringement claims made by third parties; laws, regulations, and industry standards affecting our business; compliance with open source and third-party licenses; complications with the design or implementation of our new enterprise resource planning (“ERP”) system; our reliance on information technology systems; our ESG disclosures and initiatives; and other factors and risks over which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, refer to Radware’s Annual Report on Form 20-F, filed with the Securities and Exchange Commission (SEC), and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware’s public filings are available from the SEC’s website at
www.sec.gov
or may be obtained on Radware’s website at
www.radware.com
.
Media Contact:
Gerri Dyrek
Radware
[email protected]