December 12, 2014

As reported by KrebsOnSecurity, a recently released Treasury Department report details the risks to banks of allowing anonymous Internet connections to financial applications. The report then goes on to recommend that banks should block connections...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

December 10, 2014

If the odds of you getting hit by a car today were 50/50, you’d be pretty worried, right? Well those are roughly the odds of your retail website or microsites being struck by a malicious...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

December 09, 2014

Nothing gets me into the holiday spirit like a nice number crunching exercise. This is especially true after our previous blog, where we looked at last year’s holiday season attacks. To have a better understanding...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 24, 2014

The holiday season is approaching so we thought it would be a good time to check whether cybercriminals shop as well… The holiday season encompasses two major sales events: the old Black Friday and his...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 19, 2014

Cloud-based browser testing service BrowserStack is back online following a successful attack against the company’s Amazon Web Services (AWS) infrastructure. The attacker gained access to a database of BrowserStack customer email addresses which were then...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 18, 2014

There’s an elephant in the room when it comes to big data, and I’m not just talking about the one in the Apache Hadoop logo. But, we’ll get back to that. First a little context....Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)
Every science fiction fan will tell you, there are two kinds of robots in the world: Good bots and bad bots. C-3PO? Good bot. Ultron? Bad bot. They’ll also tell you that, when confronted by...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 11, 2014

In July, I wrote about how Imperva’s SecureSphere, Incapsula and Skyfence offerings combine to provide a comprehensive security approach for applications in Amazon Web Services (AWS). I also said there was “more to come” from...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 04, 2014

Driven by compliance, auditing database activity has become a daily burden to most IT departments. At Imperva, we’ve found that over half of the organizations doing database audit are using tools embedded in their databases...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)