Venkatesh Sundar

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Indusface’s Customer – Victim of Application DDoS: Have you ever experienced a live DDoS attack on your website? It’s totally… Read More

10 years ago

OpenSSL MITM CCS vulnerability and its impact

Within weeks of the infamous Heartbleed vulnerability in one of the world’s most commonly used open-source software OpenSSL, more vulnerabilities… Read More

10 years ago

Am I Vulnerable To Cross Site Scripting (XSS)?

XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or… Read More

10 years ago

New Zero-Day Vulnerability found in Internet Explorer: Targeting Versions 6 to 11

New critical zero-day vulnerability found in Internet Explorer 6 to 11- this is the news that we woke up to,… Read More

10 years ago

Post Heartbleed, now what?

It’s been over two weeks since the world learned that websites online were vulnerable due to the OpenSSL Heartbleed vulnerability.… Read More

10 years ago

Larger implications of Heartbleed

I was looking at Heartbleed bug code and it appears that it is not a buffer overflow. Rather, the buffer… Read More

10 years ago

Real time, continuous detection, defense and protection from Heartbleed by Indusface

The day the world got to know of Heartbleed, is going to be a day that security professionals, across organizations,… Read More

10 years ago

What is Broken Authentication & How to Prevent it?

To prevent Broken Authentication vulnerability, use strong password policies, implement multi-factor authentication, and regularly monitor user activity. Read More

10 years ago

Offline, yet still exploited

The Hacker Series By Bhaumik Merchant, Information Security Research Consultant, Indusface Introduction: This article demonstrates a unique kind of communication… Read More

10 years ago

Top 3 Critical Vulnerabilities in Web Applications

From Indusface’s study on the State of Application Security in India, here are the top critical vulnerabilities that affect your… Read More

10 years ago

Detect Web Application Attacks Using Web Server Access Logs

Recently, I was conducting a security audit for an organization. They had deployed a WAF (Web Application Firewall) for their… Read More

10 years ago

How to Test for SQL Injection Vulnerabilities

UNDERSTANDING OWASP TOP 10 SERIES and how to test SQL injection vulnerabilities Open Source Web Application Consortium releases its list… Read More

10 years ago

State of Website Defacement in India

Website defacement is the electronic graffiti of choice for most “Hacktivists” these days. According to Wikipedia – Website defacement is… Read More

10 years ago

OWASP Top 10 Vulnerabilities 2013

By Client Services Team, Indusface (more…) "OWASP Top 10 Vulnerabilities 2013" Read More

10 years ago

WAF Signatures

SQL injection is one of the deadliest because it has the potential of retrieving the whole database from the web… Read More

10 years ago

How To Prevent XSS Attacks?

One of the largest portals was in news recently when their website was exploited by targeting a XSS vulnerability. Are… Read More

10 years ago

PCI 3.0 – Going beyond compliance

The PCI Security Standards Council (PCI SSC) has recently published version 3.0 of the PCI Data Security Standard (PCI DSS)… Read More

10 years ago