![PHP](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092821/php-400x200.jpg)
PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577)
An OS command injection vulnerability in Windows-based PHP (CVE-2024-4577) in CGI mode is being exploited by the TellYouThePass ransomware gang. Imperva says the attacks …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15161411/botnet-400x200.webp)
Find out which cyber threats you should be concerned about
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Understanding cyber risks beyond data breaches
While some may associate cyber risks primarily with technology and data breaches, they can also lead to brand or reputational harm, reduced productivity, and financial losses. …
![Cybercrime stats](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/06130143/cybercrime-stats-400x200.webp)
Cybercrime stats you can’t ignore
In this article, you will find excerpts from various reports that offer stats and insights about the current cybercrime landscape. Behavioral patterns of ransomware groups are …
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15111417/bad_bots-1400-400x200.jpg)
Bots dominate internet activity, account for nearly half of all traffic
49.6% of all internet traffic came from bots in 2023, a 2% increase over the previous year, and the highest level Imperva has reported since it began monitoring automated …
![network security](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15111902/network_security-1400-400x200.jpg)
Exploring the intersection of network security and modern technologies
Networks serve as the backbone of modern communication and business operations, facilitating seamless data exchange and connectivity. However, the increasing complexity of …
![bad bots](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15111417/bad_bots-1400-400x200.jpg)
Bad bot traffic skyrockets across the web
Bad bots are automated programs designed with malicious intent to perform various activities on the internet, often causing harm to individuals, organizations, and online …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08140013/attacks-400x200.jpg)
Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention
The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit …
![server room](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13093457/server-room-400x200.jpg)
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101941/genai3-400x200.jpg)
Rise in automated attacks troubles ecommerce industry
Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …
![online fraud](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25200942/online-fraud-400x200.jpg)
Online fraud can cost you more than money
Online fraud is a pervasive and constantly evolving threat that affects individuals and organizations worldwide. Online fraudsters often leverage the anonymity and convenience …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101213/data-400x200.jpg)
The hidden dangers of low-value data
In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders