• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    October 22, 2016

    Earlier this year, researchers at the Imperva Defense Center followed the money trail on CryptoWall 3.0 – one of the most widespread ransomware menaces to date. The results were astounding, and show how ransomware authors...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 21, 2016

    As published in “The Economist Intelligence Unit” October 5, 2016 By Kim DeCarlis, CMO, Imperva As threats mount, cyber security has become top of mind for a growing number of corporate boards. Directors and senior...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 17, 2016

    Financial services institutions are at the forefront of cyber security. Arguably, they’re ahead of many other industries because they’re a top target for cyber criminals. Financial institutions have high-value assets – account information, transactions and...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 11, 2016

    Researchers at the Imperva Defense Center analyzed traffic from a single Tor exit node and have created a series of blogs that describe the results. This second blog focuses on the scraping attack campaigns originating...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 07, 2016

    All companies should be aware of the EU General Data Protection Regulation (GDPR) officially known as Regulation (EU) 2016/679. Although enforcement of the GDPR is not set to begin until the spring of 2018, companies worldwide are already making plans to meet the requirements of the GDPR.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 01, 2016

    Now in its thirteenth year, NCSAM is designed to raise peoples’ awareness about the importance of cyber security. From one perspective, awareness is to people as patches are to systems. Both are designed to change behavior. A patch changes a system’s behavior; awareness should change a person’s behavior. And in many cases it doesRead More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    September 30, 2016

    Starting September 21, renowned security blogger Brian Krebs came under what would turn out to be one of the largest DDoS attacks to date. With the attack reportedly reaching a peak 620 gigabits per second...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    September 29, 2016

    “The Frost & Sullivan 2016 Latin American Company of the Year Award Cyber Security Solutions recognizes the value and growth we bring into the region as Imperva.” –Enrique Pla, RVP Sales, Imperva CALA Enrique could...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    September 27, 2016

    The healthcare cyber security landscape is changing and that includes the costs associated with breaches. The nature of data breach lawsuits is evolving as consumers, and the judiciary, become increasingly aware of the value of the data stolen and the potential for personal damage. Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    September 26, 2016

    On September 13, 2016, the New York State Department of Financial Services (NYDFS) announced proposed cyber security regulations to protect consumer data and financial systems from the ever-growing threat of cyberattacks. The proposed regulations will...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    December 06, 2016

    Phishing is the starting point for most data breaches. People are the weakest link to an organization’s security posture. Current approaches to controlling the proliferation of phishing have shown no signs of success. Imperva advocates...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    November 14, 2016

    Joomla! CVE-2016-8870 & CVE-2016-8869 This blog analyzes the privilege escalation vulnerability in Joomla! CMS and its exploitation in the wild. Based on the attack traffic, we show the statistics of the attack including a spike...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 11, 2016

    Researchers at the Imperva Defense Center analyzed traffic from a single Tor exit node and have created a series of blogs that describe the results. This second blog focuses on the scraping attack campaigns originating...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 03, 2016

    It was November 2015 when I heard the high-pitched excitement of a researcher from our Imperva Defense Center – “HTTP/2 is susceptible to slow read attacks!” It was like déjà vu all over again; five...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    November 03, 2016

    Financial institutions and e-commerce merchants have become targets of massive financial fraud as cyber criminals have used stolen payment card data from major data breaches1, such as the ones involving Wendy’s restaurants in 2015, Home...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 22, 2016

    Earlier this year, researchers at the Imperva Defense Center followed the money trail on CryptoWall 3.0 – one of the most widespread ransomware menaces to date. The results were astounding, and show how ransomware authors...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 21, 2016

    As published in “The Economist Intelligence Unit” October 5, 2016 By Kim DeCarlis, CMO, Imperva As threats mount, cyber security has become top of mind for a growing number of corporate boards. Directors and senior...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 07, 2016

    All companies should be aware of the EU General Data Protection Regulation (GDPR) officially known as Regulation (EU) 2016/679. Although enforcement of the GDPR is not set to begin until the spring of 2018, companies worldwide are already making plans to meet the requirements of the GDPR.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    November 14, 2016

    Joomla! CVE-2016-8870 & CVE-2016-8869 This blog analyzes the privilege escalation vulnerability in Joomla! CMS and its exploitation in the wild. Based on the attack traffic, we show the statistics of the attack including a spike...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 24, 2016

    On Friday Oct. 21, 2016, a DDoS attack shut down several popular internet sites. Users experienced slow access or no service to Twitter, Spotify, Shopify, SoundCloud, Reddit and The New York Times and others. The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 30, 2016

    In the Imperva Incapsula DDoS Threat Landscape Report, we share detailed information about the latest attack trends, using data collected in the course of mitigating thousands of DDoS assaults against Imperva Incapsula customers. Leveraging this...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 03, 2016

    It was November 2015 when I heard the high-pitched excitement of a researcher from our Imperva Defense Center – “HTTP/2 is susceptible to slow read attacks!” It was like déjà vu all over again; five...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    November 03, 2016

    Financial institutions and e-commerce merchants have become targets of massive financial fraud as cyber criminals have used stolen payment card data from major data breaches1, such as the ones involving Wendy’s restaurants in 2015, Home...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 27, 2016

    “Do you have any insect repellent? I’ve been told my computer has a bug.” There is no doubting that cyber security is a very technical subject, and with the current state of hacking for profit...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 24, 2016

    On Friday Oct. 21, 2016, a DDoS attack shut down several popular internet sites. Users experienced slow access or no service to Twitter, Spotify, Shopify, SoundCloud, Reddit and The New York Times and others. The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Health care organizations are at the forefront of cyber security. Arguably, they’re ahead of many other industries because they’re a top target for cyber criminals. A single patient record is worth 10 times more than...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »