37 posts categorized "Amichai Shulman"

July 09, 2015

I attended the InfoSecurity Conference in London a few weeks ago and came away with a few observations of the security situation facing today’s enterprises. Primarily, the conversations I participated in and the sessions I...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 17, 2015

Emails are one of the few technologies that almost everyone - young and old, technical and non-technical – is familiar with. There are even some employees whose entire job is to review and respond to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 24, 2014

Not often we get a chance to easily demonstrate the correlation between malware hitting personal devices and data center security. Last month we stumbled upon such priceless opportunity during a customer PoC. What happened to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 08, 2014

Comment spam is a growing field for spammers seeking to generate revenue from injecting spam commentary into interactive websites that allow user content to be displayed (such as forums and comment boards). Spammers seek to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

May 06, 2014

Today, we are releasing our latest installment in the Hacker Intelligence Initiative (HII) report series, and our focus this time is on insider threats. Specifically, our focus is on the causes for data exfiltration from...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

March 18, 2014

For a long time, PHP has been the dominant server side framework for companies to write their web applications with. In fact, ~82% of all websites today are written in PHP. And while PHP’s power...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (1)

December 11, 2013

Over past few years we’ve seen an ever-growing tide of data breaches with reports of new breaches coming out almost every day. Having said that, there are still very few published details on how actual...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

September 08, 2013

In our latest HII report, we dissect a problem that has been around for ages. The ADC research group has been studying the implications of third-party applications on the security posture of organizations. Attackers are always streamlining their activities and therefore aiming at commonly used third-party components that yield the best return on investment. With that in mind, we investigated one of the most commonly used web infrastructures: PHP.Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (3)

August 19, 2013

A couple of weeks ago, the NSA Director, General Alexander was quoted in a Reuters article saying that in order to limit data access and potential leakage, they will cut back on 90% of NSA...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)