Kaspersky Security Bulletin 2018. Story of the year: miners

Kaspersky Security Bulletin 2018. Statistics Kaspersky Security Bulletin 2018. Top security stories Kaspersky Security Bulletin 2018. Threat Predictions for 2019 Cryptocurrency miners that infect the computers of...

Beginner’s Guide to Tripwire Log Center Industrial Deployments

Beginner's Guide to Tripwire Log Center Industrial Deployments #outlook a{ padding:0; }...

Threat predictions for industrial security in 2019

Kaspersky Security Bulletin: Threat Predictions for 2019 Cryptocurrency threat predictions for 2019 Cyberthreats to financial institutions 2019: overview and predictions The past few years have been very...

The Rotexy mobile Trojan – banker and ransomware

On the back of a surge in Trojan activity, we decided to carry out an in-depth analysis and track the evolution of some other...

Vulnerability Management Buyer’s Guide

Vulnerability Management Buyer's Guide #outlook a{ padding:0; } body{ width:100% !important; }...

DirtyCOW Bug Drives Attackers to A Backdoor in Vulnerable Drupal Web Servers

In this post we’ll unpack a short — but no less serious — attack that affected some Linux-based systems, on October 31. Throughout the...

With The NASDAQ Bell Ceremony, We Kick Off The Next Leg of Imperva’s Incredible...

On Friday morning our CEO Chris Hylen and company execs rung the NASDAQ opening bell in New York, welcoming another day of trading for...

Imperva and Amazon Partner to Help Mitigate Risks Associated With Cloud Migration

Helping our customers reduce the risks associated with migrating to the cloud, and preventing availability and security incidents, has been a major development focus...

Black Friday alert

Banking Trojans traditionally target users of online financial services; looking for financial data to steal or building botnets out of hacked devices for future...

Latest article

Hackers Use Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems, deploying a newly discovered PHP webshell called JOMANGY that...

Metasploit Wrap Up 05/22/2026

Another week, another authentication bypassOur humble Metasploit weekly(ish) blog has been blessed with a new network component vulnerability. The dynamic duo of @sfewer-r7 and...

FBI warns of Kali Oauth stealers

The FBI has warned of the danger from a new wave of phishing attacks generated by a tool called Kali365....

Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can Bypass BitLocker

Microsoft has released a temporary mitigation for YellowKey, a Windows zero-day that can reportedly bypass BitLocker protections. The post Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can...