September 20, 2016
3 min ReadWhat Are Automated Attacks?
Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding
Discover the 76% : The API Traffic Your Security Tools Never See - Register Now !
September 20, 2016
3 min ReadAutomated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding
September 20, 2016
2 min ReadI am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all will know, Indusface announced its marketplace launch on April 20th.
August 30, 2016
3 min ReadWhat a year it has been so far. With millions of records stolen and thousands of dollars spent in covering from breaches and downtime, what do we get to
August 16, 2016
4 min ReadWhen anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed denial-of-services?
July 12, 2016
2 min ReadDo you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand
July 5, 2016
< 1 min ReadSources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research …
June 21, 2016
3 min Readcybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin Du, Senior Member at the Institute
May 31, 2016
2 min ReadBanking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?
May 24, 2016
6 min ReadHow do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away from you and your customers.
May 4, 2016
3 min ReadThe current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater good.
April 26, 2016
4 min ReadWith rising number of security lapses, the question is inevitable. While many companies understand the importance and need of proper web application security infrastructure, they do not know where to look for it.
April 14, 2016
2 min ReadBadlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for Samba by CVE-2016-2118 (SAMR and LSA man in the middle attacks possible).