Bots dominate internet activity, account for nearly half of all traffic

49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated traffic in 2013. For the fifth consecutive year, the proportion of web traffic as… Continue reading Bots dominate internet activity, account for nearly half of all traffic

Exploring the intersection of network security and modern technologies

Networks serve as the backbone of modern communication and business operations, facilitating seamless data exchange and connectivity. However, the increasing complexity of networks also brings forth heightened security challenges. Robust network securi… Continue reading Exploring the intersection of network security and modern technologies

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry points to compromise sensitive … Continue reading Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency mi… Continue reading 8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

The hidden dangers of low-value data

In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal the crown jewels. Desp… Continue reading The hidden dangers of low-value data

Unraveling the importance of software supply chain security

The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex network of suppliers, vendors, developers, integrators, and users, making it… Continue reading Unraveling the importance of software supply chain security