Open in app

Sign In

Write

Sign In

Imperva Research Labs
Imperva Research Labs

16 Followers

Home

About

Sep 2, 2021

How profiling employee working hours helps to detect security incidents

Written By Adam Reichenthal At the TimeMachine* company there are two special old friends Bob** and Alice**. Bob, as a team manager, usually has a very busy schedule filled with meetings all day long. You can even find him working late into the night trying to catch up on email…

Cybersecurity

8 min read

How profiling employee working hours helps to detect security incidents
How profiling employee working hours helps to detect security incidents
Cybersecurity

8 min read


Published in Imperva Research Labs

·May 20, 2021

Fast, Effective N-grams Extraction and Analysis with SQL

Written by Ori Nakar & Matan Lion Features extraction is expensive, especially when dealing with big data. That’s why it’s great when you have the ability to preprocess close to the database — the data stays in the DB and doesn’t have to move out, unless necessary. One common approach…

7 min read

Fast, Effective N-grams Extraction and Analysis with SQL
Fast, Effective N-grams Extraction and Analysis with SQL

7 min read


Published in Imperva Research Labs

·Jan 20, 2021

Python Cryptominer Botnet Quickly Adopts Latest Vulnerabilities

Written By Shiran Bareli Over the last few days, Imperva researchers have monitored the emergence of a new botnet, one whose primary activity is performing different DDoS attacks and mining cryptocurrency. …

Botnet

4 min read

Python Cryptominer Botnet Quickly Adopts Latest Vulnerabilities
Python Cryptominer Botnet Quickly Adopts Latest Vulnerabilities
Botnet

4 min read


Published in Imperva Research Labs

·Dec 22, 2020

Lessons learned building supervised machine learning into DDoS Protection

Written by Johnathan Azaria Imperva’s Data Scientists trained a machine-learning model to auto-configure DDoS security policies and this blog shares some of the lessons learned along the way. Data scientists consider labeled data the gold standard and, despite having to filter out anomalies, there is an overall tendency to trust…

Ddos Protection

9 min read

Lessons learned building supervised machine learning into DDoS Protection
Lessons learned building supervised machine learning into DDoS Protection
Ddos Protection

9 min read


Published in Imperva Research Labs

·Nov 23, 2020

Imperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS Mitigation

Written by Johnathan Azaria Much has changed since we first started providing protection against DDoS attacks. Attacks which were once considered huge are now mitigated on a daily basis, attackers are becoming more sophisticated by the day, and mitigation takes a matter of seconds, as opposed to minutes, to kick…

Ddos

5 min read

Imperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS Mitigation
Imperva SD-SOC: How Using AI and Time Series Traffic Improves DDoS Mitigation
Ddos

5 min read


Published in Imperva Research Labs

·Nov 3, 2020

Bug hunting for a quick buck using WebLogic vulnerability (CVE-2020–14882)

Written by Vitaly S. Introduction Popular within the commercial sphere, Oracle WebLogic Server is a scalable enterprise Java platform application server for Java-based web applications. When a vulnerability is discovered in WebLogic, hackers will try to exploit it ASAP. And it’s not only hackers — bug hunters also want to make…

Vulnerability

4 min read

Bug hunting for a quick buck using WebLogic vulnerability (CVE-2020–14882)
Bug hunting for a quick buck using WebLogic vulnerability (CVE-2020–14882)
Vulnerability

4 min read


Oct 19, 2020

Never Leave Your Cloud Database Publicly Accessible

Written by Vitaly S.& Sarit Yerushalmi Introduction In cybersecurity, we often hear about best practices, one of the most important of which is never to open services that should be for internal use to public access. …

Cloud

7 min read

Never Leave Your Cloud Database Publicly Accessible
Never Leave Your Cloud Database Publicly Accessible
Cloud

7 min read


Sep 27, 2020

How Account Takeover Botnets Outsmart Traditional Security Controls

Written by Yuri Geiler and Nadav Avital Account Takeover (ATO) describes when an online account is accessed and/ or used by someone other than its legitimate owner, usually for malicious purposes. …

Bots

6 min read

How Account Takeover Botnets Outsmart Traditional Security Controls
How Account Takeover Botnets Outsmart Traditional Security Controls
Bots

6 min read


Published in Imperva Research Labs

·Sep 27, 2020

The State of Vulnerabilities in 2019

Written by Dima Bekerman and Sarit Yerushalmi As a web application firewall provider, part of our job at Imperva is to continually monitor for new security vulnerabilities. To do this, we use internal software that collects information from various data sources such as vulnerability databases, newsletters, forums, social media and…

Vulnerability

12 min read

The State of Vulnerabilities in 2019
The State of Vulnerabilities in 2019
Vulnerability

12 min read


Published in Imperva Research Labs

·Sep 27, 2020

2019 Global DDoS Threat Landscape Report

Written by Nadav Avital, Avishay Zawoznik, Johnathan Azaria and Kim Lambert Today Imperva Research Labs, made up of senior researchers and industry experts who have been delivering sound and valid advice for over 15 years, is releasing a brand new Global DDoS Threat Landscape Report. …

Ddos

4 min read

2019 Global DDoS Threat Landscape Report
2019 Global DDoS Threat Landscape Report
Ddos

4 min read

Imperva Research Labs

Imperva Research Labs

16 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech