51 posts categorized "Amichai Shulman"

December 08, 2015

Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. Security vendors are challenged at the end of each calendar year to come...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

December 03, 2015

On November 6th, 2015 security researchers of FoxGlove Security released zero-day exploits for WebSphere, WebLogic, JBoss, Jenkins, and OpenNMS, facilitating in some cases Remote Code Execution attacks on application servers using these technologies. The popularity...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

September 29, 2015

Our latest installment in the Hacker Intelligence Initiative (HII) report series, Phishing Trip to Brazil, was just released. This report focuses on the story of one specific malware campaign, as an example of the current...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

August 24, 2015

I’ll start with the bottom line – social engineering is one of the most powerful tools used by attackers and is probably at the very root of every major breach. Having said that, I think...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

July 09, 2015

I attended the InfoSecurity Conference in London a few weeks ago and came away with a few observations of the security situation facing today’s enterprises. Primarily, the conversations I participated in and the sessions I...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 17, 2015

Emails are one of the few technologies that almost everyone - young and old, technical and non-technical – is familiar with. There are even some employees whose entire job is to review and respond to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 24, 2014

Not often we get a chance to easily demonstrate the correlation between malware hitting personal devices and data center security. Last month we stumbled upon such priceless opportunity during a customer PoC. What happened to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

June 08, 2014

Comment spam is a growing field for spammers seeking to generate revenue from injecting spam commentary into interactive websites that allow user content to be displayed (such as forums and comment boards). Spammers seek to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

May 06, 2014

Today, we are releasing our latest installment in the Hacker Intelligence Initiative (HII) report series, and our focus this time is on insider threats. Specifically, our focus is on the causes for data exfiltration from...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)