44 posts categorized "Amichai Shulman"

February 05, 2016

Football isn’t something we regularly cover on our cyber security blog, but when it comes to a game as big as the upcoming Super Bowl, we make an exception. It’s one of the United States’...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

February 01, 2016

We think people are asking the wrong questions with respect to IoT and cyber security. One common question is “can someone hack my dish washer and what should I do to protect it”. The answers...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

December 22, 2015

We are often asked by the media to comment about the latest breach to some company X. Such was the case in the recently reported breach of the Hilton Hotels chain and the Vtech breach...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

December 08, 2015

Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. Security vendors are challenged at the end of each calendar year to come...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

December 03, 2015

On November 6th, 2015 security researchers of FoxGlove Security released zero-day exploits for WebSphere, WebLogic, JBoss, Jenkins, and OpenNMS, facilitating in some cases Remote Code Execution attacks on application servers using these technologies. The popularity...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

September 29, 2015

Our latest installment in the Hacker Intelligence Initiative (HII) report series, Phishing Trip to Brazil, was just released. This report focuses on the story of one specific malware campaign, as an example of the current...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

August 24, 2015

I’ll start with the bottom line – social engineering is one of the most powerful tools used by attackers and is probably at the very root of every major breach. Having said that, I think...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

July 09, 2015

I attended the InfoSecurity Conference in London a few weeks ago and came away with a few observations of the security situation facing today’s enterprises. Primarily, the conversations I participated in and the sessions I...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 17, 2015

Emails are one of the few technologies that almost everyone - young and old, technical and non-technical – is familiar with. There are even some employees whose entire job is to review and respond to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)