Source: imperva.com

The Trickster Hackers - Backdoor Obfuscation and Evasion Techniques

The Trickster Hackers - Backdoor Obfuscation and Evasion Techniques

A Wordpress SPAMbot Wants You to Bet on the 2018 FIFA World Cup

A Wordpress SPAMbot Wants You to Bet on the 2018 FIFA World Cup

WordPress Arbitrary File Deletion Vulnerability Plugged With Patch 4.9.7

WordPress Arbitrary File Deletion Vulnerability Plugged With Patch 4.9.7

Optimizing A Monitoring System: Three Methods for Effective Incident Management

Optimizing A Monitoring System: Three Methods for Effective Incident Management

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Clustering App Attacks with Machine Learning Part

Clustering App Attacks with Machine Learning Part

Want to See What A Live DDoS Attack Looks Like?

Want to See What A Live DDoS Attack Looks Like?

Sonification of DDoS Attacks: Netflow Melodies and a Tomato Panic Button

Sonification of DDoS Attacks: Netflow Melodies and a Tomato Panic Button

Securing Modern Web Applications: Threats and Types of Attacks – Blog

Securing Modern Web Applications: Threats and Types of Attacks – Blog

Streamline Compliance with SWIFT Customer Security Program Requirements

Streamline Compliance with SWIFT Customer Security Program Requirements

Web Application Firewalls: The Definitive Primer

Web Application Firewalls: The Definitive Primer

Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns

Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns

4 Steps to Monitor and Audit Privileged Users of Data Stores – Blog

4 Steps to Monitor and Audit Privileged Users of Data Stores – Blog

CVE-2018-6389 WordPress Parameter Resource Consumption Remote DoS

CVE-2018-6389 WordPress Parameter Resource Consumption Remote DoS

2017 OWASP Top 10: The Good, the Bad and the Ugly – Blog

2017 OWASP Top 10: The Good, the Bad and the Ugly – Blog

Security Strategies for DevOps, APIs, Containers and Microservices – Blog | Imperva

Security Strategies for DevOps, APIs, Containers and Microservices – Blog | Imperva