December 21, 2023
2 min ReadApache Struts 2 Vulnerability CVE-2023-50164 Exposed
The latest vulnerability CVE-2023-50164 disclosed on Apache Struts affects the Struts 2 framework’s file upload logic, allowing unauthorized path traversal.
Fireside Chat : Managed Security in Action - Operational Realities for CISOs - Register Now !
December 21, 2023
2 min ReadThe latest vulnerability CVE-2023-50164 disclosed on Apache Struts affects the Struts 2 framework’s file upload logic, allowing unauthorized path traversal.
December 18, 2023
4 min ReadThe Zimbra XSS vulnerability allows an attacker to impact the confidentiality and integrity of the user’s data. Understand how to find & fix this flaw.
December 18, 2023
6 min ReadCISOs must prepare for top challenges, including LLMs threats, quantum computing, the security-UX trade-off, and alignment with technological advancements
December 15, 2023
13 min ReadAPI security is the process of securing APIs owned by the organization and external APIs used by implementing security strategies.
November 22, 2023
3 min ReadExplore crucial API security protocols, including SAML, OAuth 2.0, and JWT, ensuring robust authentication and authorization for safeguarding endpoints.
November 21, 2023
3 min ReadFacing DDoS threats? Arm your SOC & DevOps teams with effective mitigation strategies. Explore geo-fencing, IP blacklisting, and rate limiting in our playbook.
November 3, 2023
8 min ReadAn API Gateway serves as a mediator, routing API calls to backend services while delivering unified data to users, making it a crucial component for modern application architectures.
October 31, 2023
7 min ReadSecure your web apps effectively with this comprehensive web application security checklist. Mitigate all risks and bolster your application’s defense.
October 23, 2023
5 min ReadIdentify the essential parameters and components to include in your web app penetration testing checklist and learn the steps for conducting pen testing.
October 17, 2023
2 min ReadRapid Reset Attack vulnerability enables remote attackers to spike CPU usage, potentially causing DoS. Understand how to find & fix this flaw.
September 21, 2023
3 min ReadAn authenticated security scan involves conducting vulnerability assessments and security checks on a network, system, or application using valid credentials.
September 5, 2023
6 min ReadDiscover hidden risks in your digital landscape with Asset Discovery in AppTrana WAAP. Safeguard your organization from unknown threats today.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™