Putting the Reins in Good Hands
After over 300 blog posts as CEO of Centrify, this will be my last Centrify blog post.
The reason is because after having co-founded Centrify nearly 15 years ago and building it with a great team of fellow employees into a leading $100+ million in revenue cybersecurity company, I have handed over the reins.
In fact, I have handed them to...
Razy in search of cryptocurrency
Last year, we discovered malware that installs a malicious browser extension on its victim’s computer or infects an already installed extension. To do so, it disables the integrity check for installed extensions and automatic updates for the targeted browser. Kaspersky Lab products detect the malicious program as Trojan.Win32.Razy.gen – an executable file that spreads via advertising blocks on websites...
GreyEnergy’s overlap with Zebrocy
In October 2018, ESET published a report describing a set of activity they called GreyEnergy, which is believed to be a successor to BlackEnergy group. BlackEnergy (a.k.a. Sandworm) is best known, among other things, for having been involved in attacks against Ukrainian energy facilities in 2015, which led to power outages. Like its predecessor, GreyEnergy malware has been detected...
Tripwire DevOps Survival Guide for Security Professionals
Tripwire DevOps Survival Guide for Security Professionals #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; }...
Imperva Increases Self-Service Capability Fourfold with Custom Security Rules
Back in 2014, we introduced Rules (previously IncapRules) to give our customers advanced control over their application security.
Today we’re putting even more of this custom tuning power in the hands of our customers by quadrupling the number of filters available via self-service.
Rules Basics
Rules are an extensive policy engine developed in response to the emergence of increasingly advanced...
A Zebrocy Go Downloader
Last year at SAS2018 in Cancun, Mexico, “Masha and these Bears” included discussion of a subset of Sofacy activity and malware that we call “Zebrocy”, and predictions for the decline of SPLM/XAgent Sofacy activity coinciding with the acceleration of Zebrocy activity and innovation. Zebrocy was initially introduced as a Sofacy backdoor package in 2015, but the Zebrocy cluster has...
The world’s southernmost security conference
When asked about his best race, Ayrton Senna replied that it was when he raced karting cars. For him it was the best because it was only for the sake of sports and free from commercial sponsoring and commercial interests. I have this same feeling about computer security conferences, because they attract people who really seek knowledge, both to...
Dynamic Content Acceleration in Imperva CDN Improves Enterprise Website Performance
Today we introduced a new dynamic content acceleration network enhancement feature designed to improve response times to the origin server by up to 30%.
Clients using the Imperva content delivery network (CDN) service are now able to more fully leverage the high-quality connectivity between PoPs in the Imperva network. The enhancement translates to an even better experience for our clients’...
The State of Web Application Vulnerabilities in 2018
(Jan. 12 update: Due to a data transfer error, some of the 2017 figures were incorrectly reported; this version of the blog has been corrected. This error did not affect our 2018 statistics, nor our conclusions.)
As a web application firewall provider, part of our job at Imperva is to continually monitor for new security vulnerabilities. To do this, we use...














