How profiling employee working hours helps to detect security incidentsWritten By Adam ReichenthalSep 2, 2021Sep 2, 2021
Published inImperva Research LabsFast, Effective N-grams Extraction and Analysis with SQLWritten by Ori Nakar & Matan LionMay 20, 2021May 20, 2021
Published inImperva Research LabsPython Cryptominer Botnet Quickly Adopts Latest VulnerabilitiesWritten By Shiran BareliJan 20, 2021Jan 20, 2021
Published inImperva Research LabsLessons learned building supervised machine learning into DDoS ProtectionWritten by Johnathan AzariaDec 22, 2020Dec 22, 2020
Published inImperva Research LabsImperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS MitigationWritten by Johnathan AzariaNov 23, 2020Nov 23, 2020
Published inImperva Research LabsBug hunting for a quick buck using WebLogic vulnerability (CVE-2020–14882)Written by Vitaly S.Nov 3, 2020Nov 3, 2020
Never Leave Your Cloud Database Publicly AccessibleWritten by Vitaly Simonovich & Sarit YerushalmiOct 19, 2020Oct 19, 2020
How Account Takeover Botnets Outsmart Traditional Security ControlsWritten by Yuri Geiler and Nadav AvitalSep 27, 2020Sep 27, 2020
Published inImperva Research LabsThe State of Vulnerabilities in 2019Written by Dima Bekerman and Sarit YerushalmiSep 27, 2020Sep 27, 2020
Published inImperva Research Labs2019 Global DDoS Threat Landscape ReportWritten by Nadav Avital, Avishay Zawoznik, Johnathan Azaria and Kim LambertSep 27, 2020Sep 27, 2020