August 8, 2023
3 min ReadRemote Unauthenticated API Access Vulnerabilities in Ivanti
The API vulnerabilities in Ivanti CVE-2023-35078, and CVE-2023-35082, are rated 10 on CVSS. Explore their characteristics and mitigation measures.
Upcoming Webinar : Protecting APIs at Scale with API Discovery and Classification Register now!
August 8, 2023
3 min ReadThe API vulnerabilities in Ivanti CVE-2023-35078, and CVE-2023-35082, are rated 10 on CVSS. Explore their characteristics and mitigation measures.
July 20, 2023
4 min ReadDiscover the recent severe vulnerabilities in Adobe ColdFusion – CVE-2023-29298, CVE-2023-29300, and CVE-2023-29301
July 13, 2023
5 min ReadWith SIEM integration, push logs from Indusface WAS into your SIEM platform, enabling in-depth analysis of security data for deeper insights.
June 27, 2023
7 min ReadWhen conducting iOS application penetration testing, several key focus areas should be considered to ensure a comprehensive assessment.
June 20, 2023
3 min ReadProtect your business from MOVEit Transfer SQL Injection Vulnerabilities with Indusface Threat Coverage.
June 14, 2023
11 min ReadThe OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks. Here is updated OWASP API Top 10 2023 RC List.
June 7, 2023
6 min ReadAppTrana’s Self Service Rules empower you to take control, allowing you to create, view, and manage the custom rules all by yourself!
June 2, 2023
4 min ReadA zero-day vulnerability, denoted by the CVE identifier CVE-2023-30777, exposes a dangerous reflected cross-site scripting (XSS) flaw
May 29, 2023
6 min ReadSecurity misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They.
May 29, 2023
8 min ReadThe primary objective of a cybersecurity audit is to identify vulnerabilities, weaknesses, and potential threats in your IT infrastructure.
May 18, 2023
10 min Read41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in order to secure and protect APIs.
May 16, 2023
9 min ReadBroken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™