34 posts categorized "Amichai Shulman"

June 24, 2014

Not often we get a chance to easily demonstrate the correlation between malware hitting personal devices and data center security. Last month we stumbled upon such priceless opportunity during a customer PoC. What happened to...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

June 08, 2014

Comment spam is a growing field for spammers seeking to generate revenue from injecting spam commentary into interactive websites that allow user content to be displayed (such as forums and comment boards). Spammers seek to...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

May 06, 2014

Today, we are releasing our latest installment in the Hacker Intelligence Initiative (HII) report series, and our focus this time is on insider threats. Specifically, our focus is on the causes for data exfiltration from...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

March 18, 2014

For a long time, PHP has been the dominant server side framework for companies to write their web applications with. In fact, ~82% of all websites today are written in PHP. And while PHP’s power...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (1)

December 11, 2013

Over past few years we’ve seen an ever-growing tide of data breaches with reports of new breaches coming out almost every day. Having said that, there are still very few published details on how actual...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 08, 2013

In our latest HII report, we dissect a problem that has been around for ages. The ADC research group has been studying the implications of third-party applications on the security posture of organizations. Attackers are always streamlining their activities and therefore aiming at commonly used third-party components that yield the best return on investment. With that in mind, we investigated one of the most commonly used web infrastructures: PHP.Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (3)

August 19, 2013

A couple of weeks ago, the NSA Director, General Alexander was quoted in a Reuters article saying that in order to limit data access and potential leakage, they will cut back on 90% of NSA...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

May 09, 2013

Earlier this week, the “Moroccan Ghosts” published a list of 52 defaced Israeli sites, replacing site content with political propaganda pages (and some cool Moroccan music). Looking into the hacked domain list, we noticed that...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

April 22, 2013

The issue of sharing information for security purposes has become a hot discussion topic by both industry practitioners and legislators. The CISPA in the US and the CISP in the UK are examples of how...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

March 27, 2013

Last week, as part of the Spammer-Anti-Spammer wars - An attack on Spamhaus was created using a DNS amplification attack on highly rated DNS servers, the attack used Botnets to send an initial reflection request...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)