Tag: Blog

Imperva Protects Against Apache Tomcat Deserialization Vulnerability

Overview  A newly disclosed vulnerability, CVE-2025-24813, affecting Apache Tomcat, has been identified as a high-risk path equivalence vulnerability that allows attackers to manipulate filenames with internal dots (.) under specific conditions, leading to unauthorized file access, modification, and potential remote…

The Hidden Costs and Ethical Pitfalls of Content Scraping

Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website. This article has been indexed from Blog Read the original article: The Hidden Costs and Ethical Pitfalls of Content Scraping

Imperva Protects Against the Apache Camel Vulnerabilities

Introduction: Understanding the Apache Camel Flaw On March 9, 2025, Apache released a security advisory for CVE-2025-27636, a vulnerability in the Apache Camel framework that allows attackers to bypass header filtering via miscased headers. Although rated as moderate, this vulnerability…

Negative Exposure: Edimax Network Cameras Used to Spread Mirai

Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices. This article has been indexed from Blog Read the original article: Negative Exposure: Edimax Network Cameras Used to Spread Mirai

Detecting and Mitigating the Apache Camel Vulnerabilities

Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891. This article has been indexed from Blog Read the original article: Detecting and Mitigating the Apache Camel Vulnerabilities

Why Are Airlines a Prime Target for Cyberattacks?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Why Are Airlines a Prime Target for Cyberattacks?

Lightning-Fast Requests with Early Data

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Lightning-Fast Requests with Early Data

Strengthening Our Emissions Accounting Process Blog

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Strengthening Our Emissions Accounting Process Blog

Abusing VBS Enclaves to Create Evasive Malware

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Abusing VBS Enclaves to Create Evasive Malware

How to Comply with PCI DSS 4.0 Requirements 6.4.3 and 11.6.1

The countdown to compliance is in its final stretch. With the third and final phase of PCI DSS 4.0 requirements taking effect on March 31, 2025, organizations are under increasing pressure to ensure their client-side security measures meet the new…

Cryptominers? Anatomy: Cryptomining Internals

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cryptominers? Anatomy: Cryptomining Internals

How Imperva Infused AI Throughout Research and Development

The Age of AI Is Upon Us The current pace of technological change beggars’ belief. Generative Artificial Intelligence (GenAI), released to the world a mere two years ago, promises to eliminate much of the tedium of the digital world. Software…

Active Exploitation: New Aquabot Variant Phones Home

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Active Exploitation: New Aquabot Variant Phones Home

Continuing the Sustainability Conversation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Continuing the Sustainability Conversation

Akamai: Supporting Chinese Enterprises in Global Expansion

China is a cornerstone of Akamai?s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy. This article has been indexed from Blog Read the original article: Akamai: Supporting Chinese Enterprises…

DNS Silently Powers the Internet

As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous ? and delivers value for a modest investment. This article has been indexed from Blog Read the original article: DNS Silently Powers the…

Akamai API Security Release 3.41

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai API Security Release 3.41

Akamai?s Tailored Approach to Net Zero

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Tailored Approach to Net Zero

Data Security: Challenges, Solutions, and the Path Forward

Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today?s digital landscape. This article has been indexed from Blog Read the original article: Data Security: Challenges, Solutions, and the…

Making an Impact: Beach Cleanup and Reforestation Event

Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees ? and they learned how their everyday choices affect the planet. This article has been indexed from Blog Read the original article: Making an…

Imperva’s Wildest 2025 AppSec Predictions

Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing…

Protecting Unmanaged Devices with Armis and Akamai

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Protecting Unmanaged Devices with Armis and Akamai

Major Enhancements to Akamai API Security, Q4 2024

The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more. This article has been indexed from Blog Read the original article: Major Enhancements to Akamai API Security,…

DigiEver Fix That IoT Thing!

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: DigiEver Fix That IoT Thing!

AVANT and Akamai: Solving Security Challenges for Financial Services

Read why AVANT?s Trusted Advisors recommend to their clients Akamai?s award-winning solutions in cloud computing, cybersecurity, and application protection. This article has been indexed from Blog Read the original article: AVANT and Akamai: Solving Security Challenges for Financial Services

The Benefits of Serverless Computing Architecture

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Benefits of Serverless Computing Architecture

Akamai?s Perspective on December?s Patch Tuesday 2024

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Perspective on December?s Patch Tuesday 2024

Bot Reporting: 4 Key Differences to Consider

Get a detailed look at Akamai?s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses. This article has been indexed from Blog Read the original article: Bot Reporting: 4 Key Differences…

The Economic Impact of Akamai Guardicore Segmentation

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Economic Impact of Akamai Guardicore Segmentation

Akamai?s Perspective on November?s Patch Tuesday 2024

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Perspective on November?s Patch Tuesday 2024

Meet Andy Zollo, SVP of APJ Sales

Andy Zollo, who led the Imperva business in EMEA, relocated to Singapore in October to be Senior Vice President of Sales for the combined Imperva and Thales CPL businesses in the APJ region. With a wealth of experience in sales…

Business Logic Attacks Target Election-Related Sites on Election Day

As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex threat that manipulates the intended workflow of applications,…

The Definitive Guide to Linux Process Injection

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Definitive Guide to Linux Process Injection

Imperva: A Leader in WAAP

Imperva – a Thales company and leading provider of Web Application and API Protection (WAAP) solutions, is a force to be reckoned with in the cybersecurity landscape. Our comprehensive approach to security, encompassing database security, enterprise application security, bot management,…

Java(Script) Drive-By, Hacking Without 0days

A remote code execution chain in Google Chrome, which allows an attacker to execute code on the host machine, can cost anywhere from $250,000 to $500,000. Nowadays, such powers are typically reserved for governments and spy agencies. But not so…

Exploring Artificial Intelligence: Is AI Overhyped?

Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries. This article has been indexed from Blog Read the original article: Exploring Artificial Intelligence: Is AI Overhyped?

How Ransomware Is Delivered and How to Prevent Attacks

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How Ransomware Is Delivered and How to Prevent Attacks

Cyber Threats in Costume: When Attacks Hide Behind a Mask

Introduction As Halloween approaches, the idea of costumes and disguises takes center stage, but the spirit of deception isn’t limited to one night. In the digital world, cyberattacks can also wear masks, concealing their true intentions to slip past defenses.…

Bad Bots: 6 Common Bot Attacks and Why They Happen

Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies. This article has been indexed from Blog Read the original article: Bad Bots: 6 Common…

Modernizing Data Security: Imperva and IBM Z in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM Z have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

ShadyShader: Crashing Apple Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in the GPU’s drivers of iPhones, iPads, and macOS computers with M-series chips. Dubbed ShadyShader, this flaw allows a specially crafted shader program to overwhelm Apple’s GPU, causing repeated freezes that…

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

ShadyShader: Crashing Apple Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in the GPU’s drivers of iPhones, iPads, and macOS computers with M-series chips. Dubbed ShadyShader, this flaw allows a specially crafted shader program to overwhelm Apple’s GPU, causing repeated freezes that…

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

ShadyShader: Crashing Apple M-Series Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in Apple’s M-series chips that allowed us to freeze and crash Apple devices by exploiting a flaw in the GPU’s driver. This vulnerability, which we’ve dubbed ShadyShader, leverages a shader program…

How In-Person Meetings Fast-Tracked Our vPPA Negotiations in Europe

In-person interactions can build trust, foster collaboration, and achieve efficiency ? especially for complex negotiations ? even in the post-pandemic world. This article has been indexed from Blog Read the original article: How In-Person Meetings Fast-Tracked Our vPPA Negotiations in…

Call and Register ? Relay Attack on WinReg RPC Client

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Call and Register ? Relay Attack on WinReg RPC Client