Live webinar: 76% of Your API Traffic Is a Security Blind Spot : Here’s how to Fix It. May 13, 2026, 11:30 AM CEST | 03:00 PM IST.

Register Now →
Live Intelligence

Security Intelligence for Modern Threats

Real-time vulnerability analysis, threat intelligence, and expert insights to protect your web, API and AI agents from emerging attacks.

API vulnerability exploitation jumped 181% in 2025  accelerated by LLM-assisted tooling.
Loading…
Dinner with an Application Distributed Denial of Service (DDoS) Attack

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Indusface’s Customer – Victim of Application DDoS: Have you ever experienced a live DDoS attack on your website?…

OpenSSL MITM CCS vulnerability and its impact

OpenSSL MITM CCS vulnerability and its impact

Within weeks of the infamous Heartbleed vulnerability in one of the world’s most commonly used open-source software OpenSSL,…

New Zero-Day Vulnerability found in Internet Explorer: Targeting Versions 6 to 11

New Zero-Day Vulnerability found in Internet Explorer: Targeting Versions 6 to 11

New critical zero-day vulnerability found in Internet Explorer 6 to 11- this is the news that we woke…

Post Heartbleed, now what?

Post Heartbleed, now what?

It’s been over two weeks since the world learned that websites online were vulnerable due to the OpenSSL…

Larger implications of Heartbleed

Larger implications of Heartbleed

I was looking at Heartbleed bug code and it appears that it is not a buffer overflow. Rather,…

Real time, continuous detection, defense and protection from Heartbleed by Indusface

Real time, continuous detection, defense and protection from Heartbleed by Indusface

The day the world got to know of Heartbleed, is going to be a day that security professionals,…

Security heartache: OpenSSL Heartbleed

Security heartache: OpenSSL Heartbleed

On April 7th, a major vulnerability in OpenSSL, the most prevalent software used for encryption and other purposes on…

What is Broken Authentication & How to Prevent it?

What is Broken Authentication & How to Prevent it?

To prevent Broken Authentication vulnerability, use strong password policies, implement multi-factor authentication, and regularly monitor user activity.

Offline, yet still exploited

Offline, yet still exploited

The Hacker Series By Bhaumik Merchant, Information Security Research Consultant, Indusface Introduction: This article demonstrates a unique kind…

Detect Web Application Attacks Using Web Server Access Logs

Detect Web Application Attacks Using Web Server Access Logs

Recently, I was conducting a security audit for an organization. They had deployed a WAF (Web Application Firewall)…

State of Website Defacement in India

State of Website Defacement in India

Website defacement is the electronic graffiti of choice for most “Hacktivists” these days. According to Wikipedia – Website…

WAF Signatures

WAF Signatures

SQL injection is one of the deadliest because it has the potential of retrieving the whole database from…

DDoS attacks on APIs were 675% higher  than on websites in 2025. API gateways handle routing, not adversarial security.

Get weekly threat intelligence

Join 51,000+ security leaders receiving real-time alerts and analysis