Redefining CyberSecurity

Looking Back to Move Forward: Threat Research Reflections on 2023 | An Imperva Brand Story with Nadav Avital: Head of Threat Research

Episode Summary

The current state of cybersecurity and the looming threats warrant serious attention. In this Brand Story episode of "Reflections from 2023", Nadav Avital, Head of Threat Research at Imperva, sheds intriguing light on this cyber landscape.

Episode Notes

The current state of cybersecurity and the looming threats warrant serious attention. In this Brand Story episode of "Reflections from 2023", Nadav Avital, Head of Threat Research at Imperva, sheds intriguing light on this cyber landscape.

Avital outlines prominent threats of 2023, highlighting the prevalence of distinct attacks such as supply chain and distributed denial of service attacks, and business logic attacks. He emphasizes that, to navigate the evolving threat landscape effectively, it is vital to look backward to look forward.

Cyberattacks have presented consequential impacts on organizations, from monetary losses to operational disruption, and even reputational damage. For instance, Avital mentions how ransomware attacks and denial of service attacks have left businesses grappling with restoring systems, ransom payments and downtime, citing examples from real-life scenarios drawn from his observations.

Imperva’s Threat Research team takes on the monumental task of monitoring, analyzing, and protecting against these cyber threats. They utilize open-source intelligence, deep web resources and data from deployed sensors and customer networks. This multifaceted intelligence gets productized and integrated into Imperva's solutions, ensuring customers can focus on their businesses rather than worrying about cyber threats.

However, the battle against cyber threats extends beyond just protective measures. Raising awareness through communication plays a crucial role in helping the broader business and cybersecurity community understand and tackle these threats. The sharing of research findings through various channels such as blogs, newsletters and reports, helps impart invaluable knowledge, equipping readers with the necessary context and understanding of the evolving threat landscape.

Imperva’s forward-thinking approach in harnessing different intelligence resources to create protective solutions demonstrates their unrivaled expertise in the realm of cybersecurity. As Avital pointed out, it’s not solely about using advanced techniques for quality attacks but also about creatively using existing ones.

As cyber threats continue to evolve, it's paramount for organizations and cybersecurity professionals to stay abreast of these trends. Resources and research made available by teams like Imperva's Threat Research serve as a goldmine of intelligence information commanding our attention. 

Make cybersecurity a priority, leverage resources at your disposal and stay a step ahead of threats. Connect with the Imperva Threat Research team and be part of their mission to secure cyberspace. Imperva's journey into innovations and solutions is one worth following and learning from as we continue moving forward in this cyber landscape.

 

Note: This story contains promotional content. Learn more.

Guest: Nadav Avital, Head of Threat Research at Imperva [@Imperva]

On Linkedin | https://www.linkedin.com/in/nadav-avital-a508244/

On YouTube | https://www.youtube.com/channel/UCH5blYEvvzUcWD7ApRVP9Yg

Resources

Learn more about Imperva and their offering: https://itspm.ag/imperva277117988

Imperva Threat Research: https://www.imperva.com/cyber-threat-index/threat-research/

Catch more stories from Imperva at https://www.itspmagazine.com/directory/imperva

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

Episode Transcription

Please note that this transcript was created using AI technology and may contain inaccuracies or deviations from the original audio file. The transcript is provided for informational purposes only and should not be relied upon as a substitute for the original recording, as errors may exist. At this time, we provide it “as it is,” and we hope it can be helpful for our audience.

_________________________________________

[00:00:00] Sean Martin: I feel that, uh, we get to peek behind the curtain today.  
 

[00:00:47] Marco Ciappelli: Behind the curtain. That's kind of scary. But, uh, when you get in between the year, when the year change, either you look back or you look ahead. And we just talked about these before start recording that it doesn't matter. You need to look backward to look forward anyway. 
 

So let's see what is behind the curtain. What are we talking about today, Sean?  
 

[00:01:13] Sean Martin: Well, we, we get a ton of Fantastic conversations with our friends in Imperva, um, a lot of the research they do and some of the things they see and, and how they get to help their customers navigate this crazy world of cybersecurity and application security and data security. 
 

And it's a lot is driven by research and. Today we have the chance to actually learn more about that research. What's going on? What are they looking at? And who better than Oz himself? Behind the curtain of heading up all this, all this intelligence. And I'm thrilled to have you on. Nadav, it's a pleasure. 
 

Pleasure to meet you and excited for today's conversation. 
 

[00:02:06] Nadav Avital: Thank you for having me.  
 

[00:02:08] Marco Ciappelli: Well, I want to be clear on one thing. We're not thinking that you're like puffing smoke and making funny lights. The idea of the Oz is kind of like, you know, foreseeing something, but in a good way, not in a bad way.  
 

[00:02:22] Nadav Avital: Yeah, I didn't prepare any fireworks. 
 

[00:02:26] Marco Ciappelli: All right, all right. Let's not look too much behind the curtain.  
 

[00:02:30] Sean Martin: No, no, I think the point is we have to You have to look at things and then also look inside yourself, right? Um, so the intelligence as good as how you ingest it and use it in your own organization, and I think we'll, we'll probably touch on that as well, but before we do can you give us a little background on who you are, you're up to, maybe what led you to. 
 

To this role at Imperva.  
 

[00:03:00] Nadav Avital: Uh, yeah, right. Um, okay. So a little bit about myself. My name is, Nadav Avital. I lead the Imperva Threat Research team in the last, uh, three years or so. Uh, prior to that, um, I did many, threat research, uh, roles. Starting from security analyst, uh, security researcher, um, data science, um, a little bit of reverse engineering. 
 

So a little bit of, a little bit of everything, uh, really. Um, and going even further back, like my, my background and my roots are in, uh, software development. Uh, this is like, uh, how I got started with, uh, everything. And after working in Imperva, uh, I fell in love with the cybersecurity domain and here I am. 
 

[00:04:07] Marco Ciappelli: Yep. So I guess you, you always need the, a bunch of different experience to be able to get the bigger picture. It's some recurring theme that I'm finding in a lot of conversation in cybersecurity. Like, you're gotta be a little bit of a chameleon, but focus on. 
 

On a specific target, but you know, look around and come from different aspect of the research. So I think you're, as we know, perfectly positioned to unveil these curtains, and then I'm not going to make that curtain joke anymore. But looking back, uh, 2023, is that, uh, anything that really cut your attention some trends that make you be like, okay I can I can really pay attention to these things here.  
 

[00:04:53] Nadav Avital: Yes, look so like every year is unique every year we have some like new technologies new events that shape our world And 2023 was no different Uh, we had, uh, many new technologies, uh, introduced, a lot of geopolitical events that, uh, shaped, uh, the way things are, and cyber security is, is no different to be affected, like from these, uh, two things. So when I look back at 2023, I think, uh, there are a few things, uh, that kind of like, I would consider as, And like most prevalent, uh, threats. So I think perhaps, uh, starting with, I'm not sure, like, uh, this is like order of, uh, importance, but, uh, um, let's just start, start talking about this and, you know, uh, see how it goes. 
 

So we had the, uh, this is not something new, but, uh, 2023, uh, I feel like had a lot of. Uh, events or a lot of, uh, supply chain, uh, attacks. Uh, that happened during 2023, most recent one was the, the Okta incident. Uh, and prior to that, we had, uh, a few others. I think perhaps, uh, the most famous one or more like most covered one was the move it, uh, supply chain attack, uh, where many companies and organizations were affected by it. 
 

And we had a few more, uh, during 2023. I feel like this was, really big this year, more than previous years. So this is, this is like the first thing that I'm, I'm, I'm thinking about. Um, other than that, uh, we had a lot, and I mean, like, a lot of, uh, distributed denial of service attacks. It's like, uh, it's kind of a thing that never goes away. 
 

In 2023, uh, was, was the same, uh, in this, in this, uh, field. Um, we had, I think, um, probably like two or three, uh, very dominant attack, uh, groups, uh, we had, uh, kill net, uh, anonymous, uh, Sudan, uh, and a few others. That really, had big impact on the type of attacks and the magnitude of attacks that, uh, we saw. 
 

Some major companies were affected by it. Um, I think perhaps, um, CHAT GPT was, uh, one of those, or OpenAI. Or one of those companies, uh, where they like, um, the CHAT GPT service became unavailable. Also Microsoft, uh, suffered from this, uh, and then, you know, the list goes on and on. So this is another big thing that happened in 2023. 
 

From what we saw in Improva, uh, actually we saw a lot of attacks on what we consider to be business logic attacks. Uh, and like if someone is not familiar with the term, that is business logic attack is an attack that targets flows, uh, in the design and implementation of an application. Uh, and such such flows can actually be exploited by attackers to. 
 

Manipulate legitimate functionality. Um, so one of the most perhaps, uh, simple example for this is, um, authentication or like login process. Uh, this is something that almost every service or application has. This is something that, you know, is. Designed for the application to have something that is needed is crucial for the application to work, but attackers can manipulate this functionality and try to, uh, run, an attack to take over an account or to lock an account or group. 
 

mass creation of new accounts and stuff like that. So they're actually like abusing existing functionality. Uh, it's not like a zero day or anything like this, but, it's another type of attack. And what we saw in 2023 was a lot of attacks, a lot of business logic attacks. Coming, uh, our way or our customer's way, uh, with, uh, uh, major focus on APIs. 
 

So this is like kind of another, like, uh, an attack within an attack, but, APIs. Attacks are only getting, uh, uh, more dominant API communication, uh, and attackers are not missing on this opportunity. And in 2023, we saw a lot of shift in, in attacks towards APIs and specifically in this category of business logic attacks. 
 

So actually in, in, in 2020, in 2023, uh, I can, I can, um, give us an example. Two, two incidents, that, that we saw in in Imperva. Uh, first one was, uh, an airline that had its, uh, search API, scraped or heavily scraped by automated bots for flight information. And that resulted in over 500 K, uh, uh, us, US dollars, um, in charges, uh, per month for just for the API requests. 
 

The second incident was, uh, an online bank that had, uh, their login API targeted by a massive account takeover attack with over 2 million requests. And that caused a large, uh, number of, uh, account lockouts, uh, and potential, online fraud, uh, in the hacked accounts. Um, so this is, I'm going to,  
 

[00:11:26] Sean Martin: I want to pause here cause, cause really good examples. 
 

Uh, so we have a few different things and I, I say different purposefully here in supply chain. You might connect that to APIs, but we'll discuss that in a minute. VDOS and business logic attacks to me are three potentially very different ways of doing things. Um, some more. We can say visible, right? Some sit on the network, some sit on systems, some at the apps, some sit within the apps, some are sitting on services outside that apps are calling. 
 

So I'm wondering how. Where do you look for this information? What are you looking for? What are the signs that you're seeing and how does that, because I'm sure some of that's out on the, on the broad internet and the dark web, looking for signals, but then also working with customers as well. And where, where, I guess what I'm trying to figure out is what things do you see that others can't? 
 

What things should customers see but aren't looking for that together you pull, you can pull together to say there's some signs we're seeing activity and this has a potential for impact and we're seeing impact at our customers.  
 

[00:12:55] Nadav Avital: Okay, so our, so interesting question actually. Um, so there are two Two categories here. 
 

Uh, there is, um, maybe three. Um, first one is open source intelligence. That's, you know, uh, that's available for, I can say everyone to, to search, but it's not really everyone. You have to know what you are looking for and where to look for it. Uh, so yes, it is available, but you need some expertise like to, to get that information. 
 

Uh, so this is one source of, of intelligence that, that we get, uh, starting from, you know, um, public, uh, code repositories, uh, chats, forums, um, telegram channels. Discord channels, social media, you know, everything. We have like a presence there. And we're constantly monitoring all these resources. 
 

Uh, so this is, this is one thing. The other thing is, like you mentioned, uh, we have, uh, the deep, uh, deep web or the dark web, uh, resources. Um, this is again, something, um, It's not, you know, you need to have some knowledge about what you're trying. To search and what you're looking for. Um, looking for stuff like, proof of concepts, exploits, um, discussions about like, uh, zero day vulnerabilities, stuff like that. 
 

And the third category, which like. makes us what, like our knowledge unique. So everything that we see from the sensors that we deploy, uh, around the globe, uh, and this is. We have a network of honeypots that we're using and also all the thousands of customers that we are actually protecting. And like we see all the traffic and all the attacks on a daily basis, on an hourly basis. 
 

And this is like a major, uh, huge, huge amount of data. Um, just, uh, to get some perspective,  
 

we're talking about trillions of, web requests that are analyzed, uh, through the Imperva network and billions of, of attacks that are detected, uh, each, each month. So this is a lot of data, and what we do in, in, in the threat research group is we take all these different. Resources of intelligence and put them together to good use. Um, so understanding what's, what's coming, what's hot and what's not, um, what kind of like emerging threat we're seeing. And it's really nice, you know, in some way that you can see like the evolution of, a risk or a threat to an actual attack in the wild and then perhaps like in some cases like massive exploitation or campaigns that are built on top of this. 
 

[00:16:27] Marco Ciappelli: Well, we're really looking behind the The curtain here. Now, the quantity is definitely something that nobody can dub. I mean, you throw some number there that is quite impressive. What about the quality in terms of the sophistication? Because you throw a name there of a talk that we heard before. You know, the DDoS and a bunch of other things. 
 

But, um, of course, I'm going to throw AI in there. So you go with that if you want. And, uh, in general, are we looking at a more sophisticated thing? Or is it just the fact that it's easier to attack more in terms of the quantity? 
 

[00:17:10] Nadav Avital: So quality is not just, uh, so I, first I want to address like the AI, uh, elephant in the room.  
 

[00:17:22] Marco Ciappelli: Sorry, it was too early.  
 

[00:17:25] Nadav Avital: It's fine. I'm used to it. Um, so, so first of all, um, quality, like AI doesn't necessarily mean quality. Uh, just, you know, put it out there. I'm sure that, like, everyone, you know, by now has experience, has some experience with AI technologies. 
 

Uh, and I think, uh, most of us. It's understand that, you know, it's not like a magic, uh, bullet to solve everything. Uh,  
 

[00:17:57] Marco Ciappelli: isn't no, I'm kidding.  
 

[00:18:00] Nadav Avital: Um, so, you know, it's, it's good as, you know, as, you know, as the data, uh, it's been trained on, and the way that you operate. Whatever technology that you're using, um, and, perhaps, uh, I can say some relief that, uh, until now, uh, we haven't seen a lot of use in AI technology in the attacks that we've seen, uh, that's not to say that's Not gonna happen, but, uh, so far, uh, from what we've seen, from what we're seeing in, you know, in real life, there is definitely a lot of, a lot of threats and a lot of risks, uh, around this technology, don't get me wrong. 
 

Uh, I'm just saying, uh, that according to what we see, they like didn't or haven't materialized yet. But, uh, going back to your question, this was just like to address the AI part. Going back to your question, it's not just a matter of quantity, like you said. Like also quality and quality is not just about like new technologies. 
 

It's also about like how you use existing existing technologies. Uh, so let me give you a very like perhaps simple example that, uh, you know, zero day vulnerabilities. So, like, the vulnerabilities on their own, category of vulnerabilities are not new. Like, we have, like, the OWASP top 10, risk. It's been around for, I don't know, like, Dozens, a dozen of years, perhaps more. Uh, so like everyone know like, um, command injection and I know like path traversal, SQL injection, stuff, stuff like that. Um, and it's not new, but, we're always surprised to see, uh, how this kind of old categories always, you know, turn up in, in new products, in new ways. 
 

Uh, and attackers are really, really good in, in both finding these, vulnerabilities and also, uh, exploiting them. So going back to, to, to the example that I started with, with the move it, uh, bridge, this was not some kind of like a novel technology or exploit that, uh, that was created. It's like a very kind of like. 
 

Old and classic SQL injection vulnerability. Uh, that was found in their, in the Movit, um, file transfer, uh, system. Uh, and attackers took it with two hands. Um, perhaps you've heard about the CLOP, organization or CLOP cyber group. Uh, that made a fortune out of it, deploying this, uh, attack. 
 

Um, this ransomware, they, they, they created this ransomware attacks, uh, based on the movement vulnerability impacting more than 600 organizations. So, I mean, if you talk about quality, this is, you know, not always you have to go, you know. Uh, to the most advanced thing to have like a quality attack. 
 

[00:21:33] Marco Ciappelli: But what I'm getting from this is more of a of a more creative way to use the tool that you already have, right? Apply in a different way to. Kind of something new with something old. That's where I'm going.  
 

[00:21:50] Nadav Avital: Yes, and this is, this is just one example. Um, other examples of like quality attacks is, I think, uh, what we're seeing in, in specifically. Uh, and I mentioned that in business logic attacks. Uh, so business logic attacks are in many cases, attackers are trying to mimic some kind of a human behavior and human characteristics. 
 

Uh, because it's about like, uh, this, uh, business logic that you're like, uh, an operation or functionality that a human being would, uh, would do. Take, for example, the process of like a digital purchasing. Uh, so you need to, you need to log into a specific service. Let's say you're buying shoes. 
 

Uh, so you need to log into like Boots or I don't know anything else. Uh, you know, browse through the variety of shoes that they have. Uh, choose the one, uh, the ones that. You know, you like in your budget, add them to your cart, go to the check in page, uh, do the, do the payment, uh, sorry, the checkout page, do the payment. 
 

Uh, so it's a whole process. And, and when we're talking about abusing this process, and this is by the way, something that attackers really, really like to do is automated purchasing, uh, because, there's An element of profit there, uh, they're you know, targeting, sales and, and, limited goods, uh, to, you know, to, to buy very quickly by all the things that they can, and then, you know, sell it, with profit. 
 

Um, so in, in this domain, what we're seeing is actually. Like very quick adoption of attackers to. cyber defense technologies. Uh, so whatever we will use kind of detect this human behavior, uh, or this, uh, simulated human behavior attackers will respond very, very quickly, uh, and try to evade that. 
 

So we know it's not like just like all techniques. That they're using as like combination. It's a wide variety of things that, you know, whatever that they can use to make, to make it work, to make their attack, work.  
 

[00:24:35] Sean Martin: So do you see, I mean, years ago, we used to talk about low and slow attacks where the whole point, they weren't changing the attack method. 
 

They would just drag it out. So no, no, it'll be so strong that it could be detected where I feel like today, perhaps. Technology enables dozens, maybe hundreds of attacks in different ways to see what works and who cares if we get detected on one because we have 99 more operating somewhere else. Um, do you see where it's a matter of scale and trying different things in different ways against different targets that makes it easier for them to not get detected and then also harder for organizations to protect themselves? 
 

[00:25:25] Nadav Avital: I like to think about this as like, uh, uh, equation of, of, uh, not an equation, but kind of like a ROI, uh, kind of question, uh, what's the return that like an attacker gets on, uh, his investment. Um, if, if, uh, the, the target is not, You know, it's not worth the effort, it's not, you know, so perhaps, it's okay to use, uh, you know, well known, easy, easy to develop or easy to use cost, uh, techniques. 
 

But if the target is very lucrative, then, you know, it might, might be worth it for the attacker to invest time and resources, uh, to develop some, novel kind of an approach, uh, to get to this, uh, to get to this target. So it all depends, I think, uh, on, you know, Attackers motivation and what they're trying to achieve really and and you have very a lot of tools. 
 

Some of them are very easy to use. Uh, you know, perhaps like form, you know, if you want to do like, um, off the shelf tools, uh, you might get lucky. Uh, but you know, perhaps like the return on your investment, uh, you didn't invest a lot, but the return will also be like, not very high. But if you're willing, like to target like a very specific, I don't know, like a service or an application that, you know, for sure that behind it, you know, it's like, um, I don't like bank, you know, service, uh, you know, that. 
 

There will be a lot of, uh, return on your investment. Uh, so yeah, it all depends on the motivation and, and 
 

[00:27:34] Marco Ciappelli: yeah, talking about investment and, and money, I'm curious when we look at the business side of things, you mentioned at the beginning, supply chain and other things driven by, um, political and, fact, reality of things. So do you see like a prevalence of certain kind of consequences for the business, like loss of money, loss of business? 
 

I mean, what are they experiencing from what you see?  
 

[00:28:05] Nadav Avital: Um, so yeah, impact on organization is Transcripts can come in a lot of different shapes and colors, um, starting from financial losses, talking about, you know, ransomware data breaches, uh, uh, where you need to restore, you know, systems from scratch, uh, if we're talking about ransomware, uh, ransom attacks, uh, you need to like uh, To pay like the ransom payments, um, you know, fines, uh, that you might need to pay, um, because of regulation. 
 

Uh, so there is, there is an aspect of, uh, financial, uh, loss. Um, operational disruption is another, uh, big impact, uh, you know, uh, attacks that leads to, uh, disrupted operation, uh, downtime, loss of productivity, loss of critical data, uh, so this is Another impact on organization, uh, you know, we see it in, uh, many times in DDoS, uh, you know, especially when there is, I mentioned that before when there is like, uh, Important event, kind of like a very, like a limited, limited time, uh, sale or imagine that you have like a concert and, you know, there's only like a, you know, certain amount of time where you can buy the ticket tickets. 
 

Uh, so if that, during that time, uh, you know, the site, uh, the ordering site is, is down and or not available, that's a major. Impact on on the organization, um, you know, another example was just, you know, just recently the holiday season, uh, uh, Black Friday, Cyber Monday, uh, you name it, if the retail site is down or not available, uh, this is a serious, serious impact on, on the business. 
 

[00:30:19] Sean Martin: Um, and can I pause you quickly enough? Because are there cases where? A denial of service is used to take the public facing interface down, and then the same group or another group working in collaboration, leveraging APIs to continue purchasing behind the scenes and manipulating the business logic to bypass. 
 

The web interface, basically prevent, prevent the public from buying. And we, we suck up all the tickets behind the scenes through different means.  
 

[00:31:02] Nadav Avital: Yeah, interesting question. And what we've seen actually is kind of like perhaps the opposite of what you're, uh, what you describe, uh, we've seen in many cases, uh, attacks that. 
 

Kind of start in one way, but kind of end up in another way. I'll give you an example. I did mention that, banking, application, uh, that we were. That we protect, and the attack started as an account takeover attack, uh, where the attacker tried to use millions and millions of credentials, to take over customer's account. 
 

And since they were trying like, too hard, kind of, uh, you know, put it this way, this actually developed into a denial of service attack. Um, where, you know, the site, can become unresponsive suddenly, you know, just from the sheer volume of, you know, of the operations that they tried to do. Um, so, yeah, I mean, um, it's, uh, it's not, it's not exactly what you asked, but it's kind of like, uh, opposite direction to it. 
 

[00:32:25] Sean Martin: Um, I, I'm not, uh, I'm not behind the curtain, so I don't know. That's why I, I, I hypothesize, but I'm glad to hear you. You have, uh, the real good stories, .  
 

[00:32:35] Nadav Avital: Yeah. And, and going back to, to the question of impact, uh, I mean, there is also an impact of, you know, reputation damage. And I did mention, uh, legal, and regulatory challenges, you know. 
 

When you have this kind of attacks and breaches and by the way, like interesting example, uh, I mean, it was just recently, I don't remember exactly like the, the name of the attack group that did this, uh, but as you might know, in the United States, organizations are required to report to the SEC of any major, uh, cyber security event. 
 

And there was this attack group, I think, if I'm not mistaken, it was Black Hat, but don't catch me here that Sent in in the ransom note They told the company if you don't We're going to report you to the SEC. Uh, so that's, uh, you know, another interesting angle that attackers are taking, um, there's a, you know, just to get their, what they're going for. 
 

[00:33:48] Marco Ciappelli: That's creative. Now it's the, the bad guy. They're going to report you to the police. That's really new. Yeah, that's incredible.  
 

[00:33:58] Sean Martin: That's wild. Um, as we wrap here, you talked about the, that banking. Customer in the banking application. And, and you described a bit of what you do there to help at least identify what's going on and help protect them. 
 

How and where does what you do fit into how you communicate with customers in terms of things you're seeing, trends you're seeing, activities you're spotting. And how, how does what you do then fold into not just intelligence and communications, but actual. Product, um, capabilities that fold into business operations directly. 
 

So you can kind of prevent this stuff before it happens. Yeah, so two parts there. The intelligence and comms and then product based stuff.  
 

[00:34:54] Nadav Avital: So I'll start with the, uh, with the latter. So Imperva's threat research group, is dedicated to protecting cyberspace and defending against cyber attacks. And the research work, uh, It goes, um, not all of it, but a big part of it goes into, uh, in purpose products, uh, in purpose products and, and, and solutions so that, you know, our customers, are safe and, can be focused on, you know, what they really want to do on their business and not worry about all these other things, uh, all this, you know, Cyber attacks and, you know, all of this so we're working with, um, different functions within the company to take all the stuff that we see, uh, all the new, uh, protection mitigation, uh, the tech, the um, That we develop, uh, to productize, productize it and, and put it into good use, you know, improve as, uh, solutions. 
 

That are later on, uh, deployed and, and are used in, in the real world. Uh, so that's, uh, the second part of the questions. Going back to the first part of the question. Um, so everything, uh, almost everything that we see and, uh, learn, uh, from threat intelligence and attacks that we see in the Impreva network, Uh, we, uh, report. 
 

So we report it, uh, in blogs, uh, we talk a lot, we talk in, you know, security conferences, we have newsletters, uh, we have monthly reports, uh, so we try to Raise awareness, uh, as much, as much as we can, uh, in a wide variety of forms. Uh, I guess this, I guess this is another type of, uh, uh, you know, thing that we do to, to, to raise awareness. 
 

[00:37:09] Sean Martin: Yep. I love it. And yeah, to that point, I mean, we've, I'm looking back at some of the. The many conversations we've had, we've had bad bot reports, we've had, uh, consumer surveys, uh, insider threats, retail, supply chain, Terry, Gabby, loads of folks on with us to talk about the stuff that you uncover related to and directly connected to different types of businesses, different types of threats, different types of industries. 
 

And, uh, I thoroughly enjoy every one of those conversations. And it's great to actually hear. Your side of the, of this equation, which is all of this data that you're constantly monitoring externally from your customers and the added value you bring from your team's, uh, bright minds to bring all this together. 
 

And it's a pleasure meeting and chatting with you Nadov.  
 

[00:38:05] Marco Ciappelli: Yeah. And I'm going to say something here because we, we pack all this conversation and we had many. Like Sean said, with Imperva, they're all on a page dedicated to Imperva on ITSP Magazine. So I want people to listen to this, to go there, because there is a lot of different topics. 
 

We talked about AI with Ron Benatar. That was a very fun conversation. There is one with Kunal. So, uh, I mean, I think it's a library of, uh, knowledge that, uh, that comes from Imperva and People should definitely check out and share. And, uh, always a pleasure to talk with you guys. It's, uh, either behind or in front of the curtain. 
 

It's always fascinating.  
 

[00:38:52] Nadav Avital: Was happy to be here.  
 

[00:38:56] Sean Martin: Yeah, very good. And, uh, I don't know if you had any final words for those listening, um, how they can connect with you and your team.  
 

[00:39:05] Nadav Avital: Um, yeah. We're just about to launch a new, uh, section in IMPERVA website dedicated to IMPERVA threat research. 
 

So there's, uh, you know, there's this to, to wait for, um. But I mean, uh, you can browse in the Impreva website, uh, under the, the, usually the blog, the blog section, you can find a lot of interesting, things, uh, that we report on, um, not only attacks that we're seeing, but also attacks that we're uncovering, uh, zero days, new vulnerabilities that we uncover ourselves. 
 

Bye. So just in the last year we've uncovered, I think it was 6 or 7, uh, unknown, uh, security vulnerabilities in many different platforms, starting from Google Chrome, uh, OpenSea, NFT market, um, and many, many more. So always interesting to read about this as well. So not only, you know, what we're seeing, but also stuff that we You know, prevent from happening to other people,  
 

and, um, and the webpage that hopefully will be up and running in the next few days.  
 

[00:40:25] Sean Martin: Perfect. Well, we'll, uh, we'll include links to the blog and the research and make those available as soon as we publish this. And, and we'll be sure to alert our audience, uh, as to when the, the new research page comes up. 
 

So, uh, Everybody can stay tuned for that. And of course the, uh, Imperva list, directory listing, uh, we'll, we'll have all of this, uh, available to you as well. So, Adav, I really appreciate it. Um, I hope to have you back on again. Um, of course we're going to chat with other folks, throughout Imperva, uh, looking at this, the work that you do through different lenses, but it's always great to get, get some behind the scenes. 
 

So hopefully you'll join us, uh, on a future episode and thanks everybody for watching and listening here and, uh, be sure to share this. I think the one takeaway for me, Marcos, this isn't just security. This is an impacting business operations through business logic. It sounds like we need to include business folks in this conversation as well. 
 

So everybody listening who's in cyber, uh, be sure to share this with your, uh, business counterparts so they understand, uh, What the impacts can be.  
 

[00:41:40] Marco Ciappelli: Couldn't agree more.  
 

[00:41:43] Sean Martin: All right. So thanks everybody. We'll, uh, we'll catch you on the next one. I'm glad you agree, Marco.