The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack

The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack

DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research ...
Is It Legal to Evaluate a DDoS Mitigation Service?

Is It Legal to Evaluate a DDoS Mitigation Service?

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission ...
How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications

How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications

Attacks on applications can be divided into two types: targeted attacks and “spray and pray” attacks. Targeted attacks require planning and usually include a reconnaissance phase, where attackers learn all they can ...
What Do Banks and Cybersecurity Have in Common? Everything.

What Do Banks and Cybersecurity Have in Common? Everything.

New cyber-security threats require new solutions. New solutions require a project to implement them. The problems and solutions seem infinite while budgets remain bounded. Therefore, the challenge becomes how to identify the ...
Network of platforms with bots on top botnet cybersecurity concept 3D illustration

The Challenges of DIY Botnet Detection – and How to Overcome Them

Botnets have been around for over two decades, and with the rise of the Internet of Things (IoT) they have spread further to devices no one imagined they would – printers, webcams, ...
ddos attack was most packets unleashed ever

This DDoS Attack Unleashed the Most Packets Per Second Ever. Here’s Why That’s Important.

DDoS attacks are usually measured by the amount of bandwidth involved, such as the 1.35 Terabits per second (maximum) attack directed at GitHub last year, the largest DDoS attack ever at the ...
Imperva Increases Self-Service Capability Fourfold with Custom Security Rules

Imperva Increases Self-Service Capability Fourfold with Custom Security Rules

Back in 2014, we introduced Rules (previously IncapRules) to give our customers advanced control over their application security. Today we’re putting even more of this custom tuning power in the hands of ...
Security Risks: How ‘Similar-Solution’ Information Sharing Reduces Risk at the Network Perimeter

Security Risks: How ‘Similar-Solution’ Information Sharing Reduces Risk at the Network Perimeter

We live in a connected world where we have access to several tools to assist in finding any information we need. If we choose to do something risky, there is often some ...

Enhanced Infrastructure DDoS Protection Analytics: Targeted Visibility for Greater Accuracy

We’ve rolled out enhanced infrastructure protection analytics which shows top traffic patterns for traffic flowing through our Incapsula Infrastructure DDoS Protection service. Imperva clients can now view network statistics categorized by source ...
Battling Cyber Risks with Intelligent Automation

Battling Cyber Risks with Intelligent Automation

Organizations are losing the cybersecurity race. Cyber threats are evolving faster than security teams can adapt. The proliferation of data from dozens of security products are outpacing the ability for security teams ...
Loading...