• Hacker Intelligence Initiative (HII)

    Issued approximately six times a year, the Imperva Hacker Intelligence Initiative (HII) reports go inside the cyber-underground to provide in-depth, forward-looking analysis at trending hacking techniques and interesting attack campaigns. These provocative, creative and innovative research papers aim not to solely understand what has happened in the past, but to deep dive into what is ahead and what’s needed to proactively stay ahead of hackers’ next moves.

  • Beyond Takeover - Stories from a Hacked Account

    In this report, Imperva researchers explore the dynamics of credential theft. The team reversed a phishing hook to hack and track phishers using the same methods that phishers use on their victims. The report explores questions such as how long it takes from takeover to exploitation, what the attacker looks for in the hacked account, which decoys attract their attention, and what security practices they use to cover their tracks. Read the report to learn about real-world takeover stories and best practices for breach detection and remediation to protect your data.

  • Today’s File Security is So ’80s

    The complexity of managing enterprise-level file permissions makes it increasingly difficult for security teams to keep track of who has access to what. In this report, Imperva researchers compare the traditional ‘static’ approach to file security with a more dynamic approach based on how users actually access files in the organization. Using the Dynamic Peer Group Analysis machine learning algorithm, virtual working peer groups are automatically identified and suspicious files access by unauthorized users can be immediately detected.

  • Phishing made easy: Time to rethink your prevention strategy?

    In this report, Imperva researchers expose how cybercriminals are lowering the cost and increasing the effectiveness of phishing by leveraging compromised servers and turnkey phishing services, which are the key drivers of the overall increase in phishing attacks.

  • Insiders: The Threat Is Already Within

    While most enterprises are buffing up their security layers—which is important—most of the focus to date has been on threats that come from outside, while threats from within are being neglected. Read this report to find out more about this widespread security concern.