
How Imperva Infused AI Throughout Research and Development
The Age of AI Is Upon Us The current pace of technological change beggars’ belief. Generative Artificial Intelligence (GenAI), released to the world a mere two years ago, promises to eliminate much ...

Imperva Protects Against the Exploited CVEs in the Cleo Data Theft Attacks
Gabi Sharadin | | application threats, cleo, clop, imperva, Imperva Threat Research, threat detection
The Clop ransomware group has once again demonstrated its ability to exploit vulnerabilities to compromise sensitive systems. As Cleo—a managed file transfer provider for businesses—grapples with the aftermath of Clop’s targeted attack ...
How Imperva Protects the Arts Industry from Ticketing Abuse by Carding Bots
The ticketing industry is under constant threat from malicious bots, with bad actors targeting these platforms for financial gain. Bots accounted for 31.1% of all traffic to entertainment platforms in 2024, with ...

GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
Daniel Johnston | | gambling, gaming industry, Gsocket, imperva, Imperva Research Labs, Imperva Threat Research, Indonesia, Online Gaming
Since 1974, gambling has been officially illegal in Indonesia. However, the digital revolution of the 2000s introduced a new challenge: the rapid growth of online gambling platforms. This technological shift has created ...
Imperva’s Wildest 2025 AppSec Predictions
David Holmes | | AI, API security, Application Security, AppSec, GenAI, predictions, software supply chain attacks
Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated ...
Navigating the New Era of AI Traffic: How to Identify and Block AI Scrapers
In the not-so-distant past, webmasters faced challenges from bots like Google’s search spiders, which diligently scanned websites to index content and provide the best search results for users. Fast forward to today, ...
First Things First: Know and Prioritize Your Risk in Data Security
Brian Robertson | | ciphertrust, data risk, Data Security, DSF, imperva, risk, risk assessment, thales
Fortify your risk posture by shifting focus from network security to data-centric security for more robust cyber defense. Cyberattacks are one of the most onerous threats faced by businesses today. Not only ...

Imperva Defends Against LLM Hacking
In the evolving landscape of cybersecurity, the advent of large language models (LLMs) has introduced a new frontier of challenges and opportunities. Research has shown advanced LLMs, such as GPT-4, now possess ...
Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence
The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure by Design Pledge” for enterprise software manufacturers, focusing on improving the security of their products and services. This pledge outlines ...

Business Logic Attacks Target Election-Related Sites on Election Day
As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex ...