Wouldn’t it be great if you fix security holes the same day they are found? But, we all know how… Read More
Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure Read More
Today, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67 thousand free… Read More
Despite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises… Read More
In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion… Read More
Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding Read More
I am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all… Read More
What a year it has been so far. With millions of records stolen and thousands of dollars spent in covering… Read More
When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed… Read More
How did the biggest document leak happen? Before tha Read More
DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the… Read More
Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series… Read More
Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research ... Read More
cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin… Read More
ecommerce websites receive anywhere from 200 million to 2 billion visitors in a year. Of course, that is huge when… Read More
How do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away… Read More
What is a DDoS? How to stop it? Learn what happened at Fishery of Randomland and how Frank survived a… Read More
The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater… Read More