Upcoming Webinar : AI-Driven Breakthroughs for Application Security - Register Now!

Indusface Blog

Calender IconAugust 30, 2024
Clock Icon 5 min Read
Understanding OWASP Top 10 Client-Side Risks

Understand the OWASP Top 10 Client-Side Risks, common vulnerabilities in client-side code, and practical strategies to mitigate these threats effectively.

Read More...
Calender IconAugust 26, 2024
Clock Icon 4 min Read
Formjacking Attacks – How They Work and How to Prevent Them

Discover Formjacking attacks, their impact on businesses, effective prevention strategies, and PCI DSS 4.0 requirements for client-side security compliance.

Read More...
Calender IconAugust 23, 2024
Clock Icon 6 min Read
Magecart Attack – Techniques, Examples & Preventions

What is a Magecart Attack? Magecart attacks are a form of digital skimming that targets insecure websites to steal payment information. These attacks involve injecting malicious JavaScript code into e-commerce.

Read More...
Calender IconAugust 14, 2024
Clock Icon 5 min Read
CVE-2024-38856 –Apache OFBiz Pre-Auth RCE Vulnerability

A new zero-day vulnerability, CVE-2024-38856, has been discovered in the Apache OFBiz open-source enterprise resource planning (ERP) platform, presenting a critical threat to businesses worldwide. This pre-authentication remote code execution.

Read More...
Calender IconAugust 1, 2024
Clock Icon 3 min Read
Hotjar’s OAuth+XSS Flaw Exposes Millions at Risk of Account Takeover

Hotjar’s OAuth+XSS flaw risks millions. Attackers exploit this vulnerability with deceptive links, exposing user data and leading to potential takeovers.

Read More...
Calender IconAugust 1, 2024
Clock Icon 4 min Read
CVE-2024-4879 & CVE-2024-5217 Exposed – The Risks of RCE in ServiceNow

Discover critical ServiceNow vulnerabilities CVE-2024-4879 & CVE-2024-5217, exposing systems to remote code execution. Learn about risks & mitigation measures.

Read More...
Calender IconJuly 31, 2024
Clock Icon 8 min Read
Web Browser-Based Attacks – Types, Examples, and Prevention

A web browser attack targets vulnerabilities in web browsers to compromise user data. These attacks often involve injecting malicious code into web pages.

Read More...
Calender IconJuly 26, 2024
Clock Icon 3 min Read
Indusface – Product Release & Rollout SOP

Discover Indusface’s strategies for seamless code and rule deployments, ensuring minimal downtime for protected assets and continuous business continuity.

Read More...
Calender IconJuly 26, 2024
Clock Icon 5 min Read
Business Logic Vulnerability – Examples and Attack Prevention

Learn about business logic vulnerabilities with examples and prevention strategies to protect your applications from unauthorized access and manipulation.

Read More...
Calender IconJuly 20, 2024
Clock Icon 2 min Read
Crowdstrike Falcon Disruption: Why SaaS Security Vendors Need to Focus on Designing for Failure

The recent Crowdstrike disruption reveals the need for businesses to rethink their continuity plans. Learn how designing for failure enhances reliability.

Read More...
Calender IconJuly 18, 2024
Clock Icon 4 min Read
CVE-2024-27348 – A Critical RCE Vulnerability in Apache HugeGraph Server

Discover CVE-2024-27348, a critical RCE vulnerability in Apache HugeGraph-Server, its impact, and essential mitigation steps to protect your systems.

Read More...
Calender IconJuly 11, 2024
Clock Icon 2 min Read
Polyfill Supply Chain Attack Hits 100K Websites

Polyfill.io Supply Chain Attack: Over 100K websites compromised. Learn the risks, impact, and protective steps for websites using this JavaScript library.

Read More...
Sidebar Banner

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!