Hacker News
- A Picture Got My Postgres Database to Start Mining Monero (2018) https://www.imperva.com/blog/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/ 2 comments
- Imperva Security Update https://www.imperva.com/blog/ceoblog/ 2 comments
- The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View https://www.imperva.com/blog/2018/04/the-catch-22-of-base64-attacker-dilemma-from-a-defender-point-of-view/ 18 comments
- A picture got my PostgreSQL database to start mining Monero https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/ 92 comments
- Analyzing top four flaws in HTTP/2.0 [pdf] http://www.imperva.com/docs/Imperva_HII_HTTP2.pdf 2 comments
Lobsters
- The Resurrection of PHPUnit RCE Vulnerability https://www.imperva.com/blog/the-resurrection-of-phpunit-rce-vulnerability/ 4 comments php , security
- HTTP/2: In-depth analysis of the top four flaws of the next generation web protocol http://www.imperva.com/docs/Imperva_HII_HTTP2.pdf 8 comments networking , pdf , security
- Ad-blocking browser extension called AllBlock actually adds ads https://www.imperva.com/blog/the-ad-blocker-that-injects-ads/ 21 comments privacy
- Is Web Scraping Illegal? Depends on What the Meaning of the Word Is https://www.imperva.com/blog/is-web-scraping-illegal/ 4 comments webdev
- HTTP Desync Attacks in the Wild and How to Defend Against Them https://www.imperva.com/blog/http-desync-attacks-and-defence-methods/ 8 comments netsec
- The evolution of “Code Cohesion” and “Separation of Concerns” https://www.imperva.com/blog/from-layers-to-microunits/ 6 comments coding
- A detailed explanation of how DNS works and its main threats https://www.imperva.com/blog/why-should-you-worry-about-dns-attacks/ 4 comments programming
- Introduction to SQL: Examples, Best Practices and Pitfalls https://www.imperva.com/blog/introduction-to-sql-examples-best-practices-and-pitfalls/ 3 comments programming
- Ransomware Attacks on MySQL and MongoDB https://www.imperva.com/blog/ransomware-attacks-on-mysql-and-mongodb/ 20 comments programming
- Imperva Takes on its Largest Recorded Account Takeover Attack on a Single Company https://www.imperva.com/blog/imperva-takes-on-its-largest-recorded-account-takeover-attack-on-a-single-company/ 14 comments netsec
- When Bandwidth Doesn’t Last https://www.imperva.com/blog/when-bandwidth-doesnt-last/ 3 comments programming
- A Picture Got My Postgres Database to Start Mining Monero https://www.imperva.com/blog/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/ 90 comments programming
- The Resurrection of PHPUnit RCE Vulnerability https://www.imperva.com/blog/the-resurrection-of-phpunit-rce-vulnerability/ 16 comments programming
- Imperva Cloud WAF (Inscapula) breach https://www.imperva.com/blog/ceoblog/ 10 comments netsec
- The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack https://www.imperva.com/blog/the-ping-is-the-thing-popular-html5-feature-used-to-trick-chinese-mobile-users-into-joining-latest-ddos-attack/ 32 comments webdev
- The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack | Imperva https://www.imperva.com/blog/the-ping-is-the-thing-popular-html5-feature-used-to-trick-chinese-mobile-users-into-joining-latest-ddos-attack/ 10 comments netsec
- The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View https://www.imperva.com/blog/2018/04/the-catch-22-of-base64-attacker-dilemma-from-a-defender-point-of-view/ 3 comments netsec
- A Deep Dive into Database Attacks [Part III]: Why Scarlett Johansson’s Picture Got My Postgre Database to Start Mining Monero https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/ 2 comments netsec
- Analysis of top 4 flaws in HTTP/2 http://www.imperva.com/docs/imperva_hii_http2.pdf 11 comments netsec
- Assessing the Effectiveness of Antivirus Solutions [PDF] https://www.imperva.com/docs/hii_assessing_the_effectiveness_of_antivirus_solutions.pdf 4 comments netsec
- Analysis of 250,000 hacker conversations [PDF] http://www.imperva.com/docs/hii_monitoring_hacker_forums.pdf 16 comments netsec