Application Security for Startups and SMEs

Despite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises (SME) don’t feel that they

Read More

Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users

Read More

What Are Automated Attacks

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Read More

Availability of BYOL option for TAS in AWS

BYOL option in AWS. Starting 19th Sept 2016, Indusface TAS AMI is available on Amazon Web Service with Bring Your Own License According to Ashish Tandon

Read More

20 Website Security Stats from 2016

What a year it has been so far. With millions of records stolen and thousands of dollars spent in covering from breaches and downtime, what do we get to

Read More

6 Things You Should Know About DDoS Attacks

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed denial-of-services?

Read More

SQL Injection in Panama Paper Leak

How did the biggest document leak happen? Before that, here’s what the whole ruckus is about. Simplified. Little Frank gets 4 coins every week.

Read More

What is Layer 7 DDoS Attack

DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the emotional aspects that a company

Read More

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand

Read More

Major Cyber Security Numbers – 2016

Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research ...

Read More