7 posts categorized "Nadav Avital"

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

November 24, 2014

The holiday season is approaching so we thought it would be a good time to check whether cybercriminals shop as well… The holiday season encompasses two major sales events: the old Black Friday and his...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

March 18, 2014

For a long time, PHP has been the dominant server side framework for companies to write their web applications with. In fact, ~82% of all websites today are written in PHP. And while PHP’s power...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (1)

November 18, 2013

JBoss Application Server (or JBoss AS) is an open-source Java EE-based application server. JBoss AS was developed by JBoss, now a division of Red Hat. On late 2012, JBoss AS was named as WildFly. Recently,...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

November 05, 2013

Yesterday, Brian Krebs wrote an article on how several high end car/limousine service companies were breached and customer information was stolen. This resonated very strongly since some of the victims were celebrities, lawmakers and top...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (1)

October 08, 2013

vBulletin is a popular proprietary CMS (content management system) that was recently reported to be vulnerable to an unspecified attack vector. vBulletin is currently positioned 4th in the list of installed CMS sites on the...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

July 03, 2013

With the announcement of SecureSphere version 10.0, Imperva added a crowd-sourced threat intelligence service that aggregates and validates attack data from WAFs to protect against hackers, automated clients, and zero-day attacks. We can then validate...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)