Imperva Research LabsHow profiling employee working hours helps to detect security incidentsWritten By Adam ReichenthalSep 2, 2021Sep 2, 2021
Imperva Research LabsinImperva Research LabsFast, Effective N-grams Extraction and Analysis with SQLWritten by Ori Nakar & Matan LionMay 20, 2021May 20, 2021
Imperva Research LabsinImperva Research LabsPython Cryptominer Botnet Quickly Adopts Latest VulnerabilitiesWritten By Shiran BareliJan 20, 2021Jan 20, 2021
Imperva Research LabsinImperva Research LabsLessons learned building supervised machine learning into DDoS ProtectionWritten by Johnathan AzariaDec 22, 2020Dec 22, 2020
Imperva Research LabsinImperva Research LabsImperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS MitigationWritten by Johnathan AzariaNov 23, 2020Nov 23, 2020
Imperva Research LabsinImperva Research LabsBug hunting for a quick buck using WebLogic vulnerability (CVE-2020–14882)Written by Vitaly S.Nov 3, 2020Nov 3, 2020
Imperva Research LabsNever Leave Your Cloud Database Publicly AccessibleWritten by Vitaly Simonovich & Sarit YerushalmiOct 19, 2020Oct 19, 2020
Imperva Research LabsHow Account Takeover Botnets Outsmart Traditional Security ControlsWritten by Yuri Geiler and Nadav AvitalSep 27, 2020Sep 27, 2020
Imperva Research LabsinImperva Research LabsThe State of Vulnerabilities in 2019Written by Dima Bekerman and Sarit YerushalmiSep 27, 2020Sep 27, 2020
Imperva Research LabsinImperva Research Labs2019 Global DDoS Threat Landscape ReportWritten by Nadav Avital, Avishay Zawoznik, Johnathan Azaria and Kim LambertSep 27, 2020Sep 27, 2020