Live webinar: 76% of Your API Traffic Is a Security Blind Spot : Here’s how to Fix It. May 13, 2026, 11:30 AM CEST | 03:00 PM IST.

Register Now →
Live Intelligence

Security Intelligence for Modern Threats

Real-time vulnerability analysis, threat intelligence, and expert insights to protect your web, API and AI agents from emerging attacks.

API vulnerability exploitation jumped 181% in 2025  accelerated by LLM-assisted tooling.
Loading…
Are you unknowingly victimizing the end-users of your website?

Are you unknowingly victimizing the end-users of your website?

by Venkatesh Sundar, Chief Technology Officer, Indusface Web applications frequently redirect and forward users to other pages and…

Is your website at risk from the 50,000 compromised WordPress sites?

Is your website at risk from the 50,000 compromised WordPress sites?

Mass infection of nearly 50,000 websites has been reported. A recently patched vulnerability in the popular newsletter plug-in…

Are CISOs Becoming the Soft Target?

Are CISOs Becoming the Soft Target?

The CISOs are trying their level best to cope with the rising and unique nature of cyber threats.…

7 Habits of Highly Effective WAFs (Web Application Firewalls)

7 Habits of Highly Effective WAFs (Web Application Firewalls)

WAF have been a critical part of securing external facing websites for years now. Here are 7 best…

Zeus Shines On – The Return of the $100 bn Banking Malware

Zeus Shines On – The Return of the $100 bn Banking Malware

Gameover Zeus first appeared in September 2011. FBI had held Gameover Zeus botnet responsible for the theft of…

627% Growth in Unethical Hacking Urges Indian Government to brisk up Security Measures

627% Growth in Unethical Hacking Urges Indian Government to brisk up Security Measures

The rising trend in cyber-crimes against Indian establishments has urged the Government to toughen its stand. The Centre…

Sensitive Data Exposure – A Nightmare To All Business Enterprises

Sensitive Data Exposure – A Nightmare To All Business Enterprises

Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other…

If you operate insecure infrastructure – Microsoft may seize it for “greater-good”

If you operate insecure infrastructure – Microsoft may seize it for “greater-good”

According to the recent actions of technology heavy weight Microsoft, if a company operates insecure infrastructure, that is…

90% of Mobile Banking Apps are Vulnerable

90% of Mobile Banking Apps are Vulnerable

90% of the top mobile banking apps have been found to have serious security flaws. Securing your mobile…

Cross Site Request Forgery (CSRF): The Sleeping Giant in Hackers’ World

Cross Site Request Forgery (CSRF): The Sleeping Giant in Hackers’ World

Cross Site Request Forgery forces an end user to execute unwanted actions on a web application in which…

Has DDoS become the hacker’s No. 1 choice of attack?

Has DDoS become the hacker’s No. 1 choice of attack?

DDoS attacks have rapidly become hacker’s choice of attack, with evidently many major businesses falling at the receiving…

And so the breaches continued: Twitter’s TweetDeck Hacked

And so the breaches continued: Twitter’s TweetDeck Hacked

TweetDeck, the popular social media dashboard application for management of Twitter accounts, had to be temporarily shut down…

DDoS attacks on APIs were 675% higher  than on websites in 2025. API gateways handle routing, not adversarial security.

Get weekly threat intelligence

Join 51,000+ security leaders receiving real-time alerts and analysis