Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconNovember 11, 2014
Clock Icon 4 min Read
How to Prevent Drupal SQL Injection Vulnerability?

This problem was disclosed on the 15t of October that Drupal 7 was highly vulnerable to SQL injection.

Read More...
Calender IconNovember 5, 2014
Clock Icon 3 min Read
Biggest Security Risk – “Data Breach Fatigue”

Data Breach Fatigue: The Biggest Security Risk. Learn how it affects you & your business. Tips to avoid it. Read more now

Read More...
Calender IconOctober 30, 2014
Clock Icon 3 min Read
Heartbleed or Shellshock – Which one is more danger?

There have been several atrocious security vulnerabilities announced in the last few months, with “Heartbleed” in web servers and Shellshock in shell command lines. There are too many questions in the.

Read More...
Calender IconOctober 15, 2014
Clock Icon 3 min Read
All You Need To Know About POODLE Vulnerability

Today, Google announced a POODLE vulnerability in the implementation of the SSL 3.0 protocol potentially compromising secure connections online. Know more

Read More...
Calender IconOctober 9, 2014
Clock Icon 2 min Read
Massive Botnet Attack: 800 Thousand Bank Transactions Sniffed

800K bank transactions were sniffed in a massive botnet attack. Keep your finances secure by staying vigilant online.

Read More...
Calender IconOctober 7, 2014
Clock Icon 3 min Read
Hey Experts, Is Application Security your Stepchild?

The web has evolved and has changed from providing only static experience to an interactive and dynamic platform which is being used today by all major businesses and organizations to.

Read More...
Calender IconOctober 1, 2014
Clock Icon 3 min Read
Is Cloud Secure?

Thousands of businesses are moving to cloud? But is cloud secure? Can you simply leave everything on the cloud provider?

Read More...
Calender IconSeptember 26, 2014
Clock Icon 2 min Read
While the world is shell shocked, our customer are preparing for the weekend

The world is shell-shocked! And while the system owners are busy understanding the vulnerability and are still finding out ways to detect it, attackers are not showing any mercy. We.

Read More...
Calender IconSeptember 25, 2014
Clock Icon 3 min Read
How Not to Get BASH-ed

A major vulnerability in the Bourne Shell — called bash shell – has come to the fore. This vulnerability existed from a long time.

Read More...
Calender IconSeptember 23, 2014
Clock Icon 3 min Read
Cybercriminals Piggybacking on Google’s DoubleClick for Rapid Distribution

As per a latest report, Cybercriminals have exploited the power of two online advertising networks, Google’s DoubleClick and popular Zedo advertising agency.

Read More...
Calender IconSeptember 22, 2014
Clock Icon 6 min Read
Gmail hacked- how to check if your account is safe?

By Indusface Research Team As per some reports, Gmail has been hacked and 5 million user names and passwords were stolen from compromised accounts. What does this mean for you?.

Read More...
Calender IconSeptember 12, 2014
Clock Icon < 1 min Read
State of Application Security in India

Read More...

Managed WAF

Starts at $99

Guided onboarding, monitoring of latency, false positives, and DDoS attacks, custom rules, and more

Try Free For 14 Days

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!