Incapsula

Imperva explains how hackers stole AWS API Key and accessed to customer dataImperva explains how hackers stole AWS API Key and accessed to customer data

Imperva explains how hackers stole AWS API Key and accessed to customer data

Imperva shared details on the incident it has recently suffered and how hackers obtain data on Cloud Web Application Firewall…

6 years ago
$38 an hour is the cost of destructive DDos Attacks$38 an hour is the cost of destructive DDos Attacks

$38 an hour is the cost of destructive DDos Attacks

DDOS attacks have become cheaper than one can think, just because of the era of DDOS-for-hire services. However, such attacks…

10 years ago
Mass-Scale Abuse of poorly configured SOHO RoutersMass-Scale Abuse of poorly configured SOHO Routers

Mass-Scale Abuse of poorly configured SOHO Routers

Several dozen Imperva Incapsula customers were targeted by a DDoS botnet comprised of tens of thousands of hijacked SOHO routers.…

10 years ago
Fake Googlebots used to run application-layer DDoSFake Googlebots used to run application-layer DDoS

Fake Googlebots used to run application-layer DDoS

Security experts at Incapsula are observing a surge in the used of fake Googlebots to launch and carry out application-layer…

11 years ago
Persistent XSS in Top Website enables large-Scale DDoS attackPersistent XSS in Top Website enables large-Scale DDoS attack

Persistent XSS in Top Website enables large-Scale DDoS attack

Incapsula firm discovered the exploitation of a persistent XSS vulnerability in one of the world most popular website to run…

11 years ago
Website traffic report shows an increase of malicious bots activityWebsite traffic report shows an increase of malicious bots activity

Website traffic report shows an increase of malicious bots activity

Incapula security firm published a new report on the analysis of website traffic evidencing the increment for malicious activities. Researchers…

11 years ago
Two-factor Authentication for SMBsTwo-factor Authentication for SMBs

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…

12 years ago