• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    June 09, 2016

    Imperva Defense Center researchers found long-running, multi-vector Search Engine Optimization (SEO) campaigns in use by hackers to illegally promote illicit websites such as online pharmacies and adult sites. The multi-vector Black Hat SEO campaign employed...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 07, 2016

    Malicious insiders are hogging the limelight, narrowing the focus on a smaller group that puts enterprise data at risk. Mark Kraynak, Senior Vice President here at Imperva, sheds some light on the topic in this...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 06, 2016

    For those of you who haven’t heard yet, none other than Facebook’s Mark Zuckerberg was hacked. Even though LinkedIn tried to play down a breach of their platform that resulted in 117 million of their...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 25, 2016

    A recent report by Gartner analysts Anton Chuvakin and Eric Heidt called "Understanding Insider Threats" (May 2016) defines insider threats "as individuals who were deliberate in their theft, misuse or destruction of data or systems.”...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 18, 2016

    With all of the recent attention around the release of Imperva CounterBreach, it may have been easy to miss our announcement regarding a recently inked partnership with Camouflage Software to provide a best-of-breed data masking...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 15, 2016

    As far back as 2003, buffer overflow attacks constituted a full 23% of all identifiable digital vulnerabilities. Today, buffer overflow attacks still pose a substantial threat with last year’s vulnerability – known as “Ghost” –...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 14, 2016

    Ransomware is now #2 in the crimeware list published by Verizon in their latest data breach report. Before we delve into the details of why crimeware/malware is spreading at such alarming levels, we would like...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 11, 2016

    Given the rapid adoption of cloud apps and the proliferation of BYOD in the workplace, the need for a Cloud Access Security Broker (CASB) is more pronounced than ever before. Here's a checklist of requirements that all organizations should take into consideration as they embark on their CASB initiatives.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 08, 2016

    The hack of the month for April 2016 could be given to the Bangladeshi breach where $81 million was mysteriously siphoned off from the bank and sent to the money-laundering underworld of the casino system...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 06, 2016

    Web applications attacks are the #1 source of data breaches for the year 2015 - Verizon DBIR 2016. Hackers exploit the weakest links – users/humans and applications – to get to your enterprise data. Humans...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    June 09, 2016

    Imperva Defense Center researchers found long-running, multi-vector Search Engine Optimization (SEO) campaigns in use by hackers to illegally promote illicit websites such as online pharmacies and adult sites. The multi-vector Black Hat SEO campaign employed...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 14, 2016

    Ransomware is now #2 in the crimeware list published by Verizon in their latest data breach report. Before we delve into the details of why crimeware/malware is spreading at such alarming levels, we would like...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 25, 2016

    In our recent research report, we followed the infection chain and operation of CryptoWall 3.0 ransomware, focusing on payments made by victims and how those payments eventually aggregate to a small number of Bitcoin wallets...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 04, 2016

    The “long arm of the law” may be delayed in serving justice, but it did round up counterfeit scammers like www.montblancoutlet.com. Imperva ThreatRadar Community Defense was ahead of the game in detecting such spammers that...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    June 27, 2016

    In April 2016, Dimension Data (NTT group), a top Imperva channel partner, published the Global Threat Intelligence Report (GTIR) for the year 2015 based on threats evaluated against their clients and honeynets across a variety...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 23, 2016

    Over the past few years, we’ve witnessed the advent of industrialized hacking. It’s long since moved past the stage of script kiddies and phone phreakers. It’s become a lucrative industry run by various mafia, international...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 21, 2016

    In December 2015, the EU Commission reached an agreement on two key data protection regulations – the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NISD). The GDPR and the NISD...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 20, 2016

    In late 2015, TalkTalk Telecom Group, a telecommunications provider in the United Kingdom, suffered a breach. The breach exposed the details of over 150,000 customers, including more than 15,000 bank account details and 28,000 credit...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    April 25, 2016

    In our recent research report, we followed the infection chain and operation of CryptoWall 3.0 ransomware, focusing on payments made by victims and how those payments eventually aggregate to a small number of Bitcoin wallets...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 04, 2016

    The “long arm of the law” may be delayed in serving justice, but it did round up counterfeit scammers like www.montblancoutlet.com. Imperva ThreatRadar Community Defense was ahead of the game in detecting such spammers that...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 26, 2016

    Three months after the previous report we thought it is a good opportunity to check in on the CVEs registered by Imperva SecureSphere Web Application Firewalls. We found some interesting trends – highlighting the most...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 22, 2016

    When you hear about the recent devastating attacks involving smartphones, malware infection of Android/iOS comes naturally to your mind. However, once you take a closer look at these mobile security incidents, you will be surprised...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    June 10, 2016

    Challenge today's security thinking. Learn about the top threats to enterprise data and the latest technologies in data breach prevention. The worst kept secret in enterprise security is that the people on the payroll pose...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 18, 2016

    With all of the recent attention around the release of Imperva CounterBreach, it may have been easy to miss our announcement regarding a recently inked partnership with Camouflage Software to provide a best-of-breed data masking...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 28, 2016

    Increasingly, Cloud Access Security Brokers (CASB) are being used by IT to align with their cloud strategies well beyond app discovery and risk assessment of unauthorized apps. Organizations are getting more value from CASBs by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 26, 2016

    External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »