Imperva Takes on its Largest Recorded Account Takeover Attack on a Single Company

Imperva recently detected and mitigated the largest – and most concentrated – series of brute force ATO (account takeover) attacks in its history. Over the course of 60 hours from midnight on October 28, our ATO team’s monitoring syst… Continue reading Imperva Takes on its Largest Recorded Account Takeover Attack on a Single Company

Smart Mesh Topology Boosts Capacity and Performance

Recently we introduced our advanced architectural topology for ensuring that traffic inspection and request logs are maintained within the region. This capability is especially beneficial to our customers who need to meet certain regional compliance re… Continue reading Smart Mesh Topology Boosts Capacity and Performance

Python and Go Top the Chart of 2019’s Most Popular Hacking Tools

Imperva Cloud WAF protects over a hundred thousand websites globally and observes around a billion of attacks daily. We detect thousands of hacking tools on a daily basis and employ various measures to stop malicious requests. In this blog post we&#821… Continue reading Python and Go Top the Chart of 2019’s Most Popular Hacking Tools

New Cyber Threat Index Shows Industries Are Under Attack in Uncertain Times

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes in traffic and attack trends across multiple indust… Continue reading New Cyber Threat Index Shows Industries Are Under Attack in Uncertain Times

Surge in online traffic increases risk to businesses

Imperva Research Labs has been monitoring the data across our thousands of customers since the outbreak of COVID-19. In reviewing anonymized data from our CyberThreat Index, we see new risks and several initial security implications from this pandemic … Continue reading Surge in online traffic increases risk to businesses

Remote File Inclusion (RFI) – Detecting the Undetectable

Intro Remote File Inclusion [RFI] is an attack exploiting the functionality in web applications which allows the inclusion of external source code without validating its content or origin. An RFI payload is a link that points to a malicious file that a… Continue reading Remote File Inclusion (RFI) – Detecting the Undetectable

Lift the DDoS Smokescreen: Investigate Underlying Attacks

“Hold out baits to entice the enemy. Feign disorder, and crush him.” ~ Sun Tzu The sophistication of cybercriminals and the attraction of the “Black Hat” cyberspace have grown dramatically over the years. In the past, cyber assa… Continue reading Lift the DDoS Smokescreen: Investigate Underlying Attacks