Database Ransomware: From Attack to Recovery
Omri Cohen | | database, database ransomware, Database Security, encryption, exfiltration, Imperva Threat Research, mysql, Ransomware
Introduction In recent years, ransomware attacks have risen sharply, due to their profitability, ease of access with ransomware-as-a-service (RaaS) tools, and an increasing attack surface. Ransomware is a type of attack in ...
Breaking the Chain of Data Access: The Importance of Separating Human and Application Users
Data, the lifeblood of any organization, relies on the database as its beating heart. As a result, businesses invest heavily in designing and monitoring all access to it. In traditional literature, there ...
How to use DSF Collections & Index Patterns – A Tutorial
In conventional terminology, Imperva Data Security Fabric (DSF) is a database system, replete with a GUI interface for aggregation pipeline building, workflow orchestration, extensible scripting (Playbooks), and self-service data discovery (Kibana-based Discover) ...
DDoS Attacks Leveraged by Attackers in Israel Conflict
Over the last few years, we’ve observed Distributed Denial of Service (DDoS) attacks used in many conflicts. In the Russia-Ukraine war, DDoS was used both by government cyber agencies and individual hacktivist ...
Recent Vulnerabilities in Popular Applications Blocked by Imperva
Multiple vulnerabilities in popular and widespread applications have been disclosed recently, tracked as CVE-2023-36845, CVE-2023-40044, CVE-2023-42793, CVE-2023-29357, and CVE-2023-22515. These vulnerabilities, which affect several products and can be exploited to allow arbitrary ...
Why Cool Dashboards Don’t Equal Effective Security Analytics
Mark Twain once said, “Data is like garbage. You’d better know what you are going to do with it before you collect it.” This statement rings true in today’s cybersecurity landscape. Security ...
Protecting Against HTTP/2 Rapid Reset
Today, Google disclosed a zero-day vulnerability in the HTTP/2 protocol. Imperva collaborated proactively with Google to gain advanced insights into this vulnerability. After a comprehensive inspection of this vulnerability by Imperva’s Product ...
How to Protect Against Data Lake Hacking
Data lakes, or centralized repositories for large-scale data, are a popular solution for data storage, and there are good reasons for that. Data lakes are flexible and cost-effective, as they allow many ...
Elevate Your Cybersecurity with Imperva Cloud WAF: More Than Just a Checkbox
Luke Richardson | | Application Security, cloud WAF, Imperva Cloud WAF, waf, Web Application Firewall
In the world of digital modernization, having a web application firewall (WAF) isn’t an option – it’s a necessity. But in the endless sea of security solutions, how do you choose the ...
The Dark Side of Web Development: Why You Should Be Prioritizing Shadow Code
Erez Hasson | | Application Security, Client-Side Protection, Compliance, GDPR, GDPR compliance, Magecart Attacks, PCI Compliance, PCI DSS, sql injection
In the fast-paced world of web development, staying ahead of the curve is paramount, as developers are frequently under pressure to deliver products and functionalities quickly and efficiently. To meet accelerated timelines, ...