Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconApril 24, 2014
Clock Icon 2 min Read
Post Heartbleed, now what?

It’s been over two weeks since the world learned that websites online were vulnerable due to the OpenSSL Heartbleed vulnerability. Explore our blog here.

Read More...
Calender IconApril 18, 2014
Clock Icon 2 min Read
Larger implications of Heartbleed

I was looking at Heartbleed bug code and it appears that it is not a buffer overflow. Rather, the buffer is left unfilled and the receiver fooled. The receiver just.

Read More...
Calender IconApril 18, 2014
Clock Icon 2 min Read
Real time, continuous detection, defense and protection from Heartbleed by Indusface

The day the world got to know of Heartbleed, is going to be a day that security professionals, across organizations, more than anyone else will remember.

Read More...
Calender IconApril 11, 2014
Clock Icon 4 min Read
Security heartache: OpenSSL Heartbleed

On April 7th, a major vulnerability in OpenSSL, the most prevalent software used for encryption and other purposes on the web and the internet was discovered. Here are details about what.

Read More...
Calender IconApril 4, 2014
Clock Icon 6 min Read
What is Broken Authentication & How to Prevent it?

To prevent Broken Authentication vulnerability, use strong password policies, implement multi-factor authentication, and regularly monitor user activity.

Read More...
Calender IconMarch 28, 2014
Clock Icon 5 min Read
Offline, yet still exploited

The Hacker Series By Bhaumik Merchant, Information Security Research Consultant, Indusface Introduction: This article demonstrates a unique kind of communication technique between an attacker machine and a victim machine during.

Read More...
Calender IconMarch 21, 2014
Clock Icon 2 min Read
Top 3 Critical Vulnerabilities in Web Applications

From Indusface’s study on the State of Application Security in India, here are the top critical vulnerabilities that affect your web applications.

Read More...
Calender IconMarch 14, 2014
Clock Icon 3 min Read
Detect Web Application Attacks Using Web Server Access Logs

Recently, I was conducting a security audit for an organization. They had deployed a WAF (Web Application Firewall) for their critical web apps. However, when I asked them about the.

Read More...
Calender IconMarch 7, 2014
Clock Icon 3 min Read
How to Test for SQL Injection Vulnerabilities

UNDERSTANDING OWASP TOP 10 SERIES and how to test SQL injection vulnerabilities Open Source Web Application Consortium releases its list of top 10 web vulnerabilities, every three years. The second.

Read More...
Calender IconFebruary 28, 2014
Clock Icon 3 min Read
State of Website Defacement in India

Website defacement is the electronic graffiti of choice for most “Hacktivists” these days. According to Wikipedia – Website defacement is “an attack on a website that changes the visual appearance.

Read More...
Calender IconFebruary 19, 2014
Clock Icon 2 min Read
OWASP Top 10 Vulnerabilities 2013

By Client Services Team, Indusface

Read More...
Calender IconFebruary 5, 2014
Clock Icon 3 min Read
WAF Signatures

SQL injection is one of the deadliest because it has the potential of retrieving the whole database from the web server. See how WAF signatures can help.

Read More...

Managed WAF

Starts at $99

Guided onboarding, monitoring of latency, false positives, and DDoS attacks, custom rules, and more

Try Free For 14 Days

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% Customer Recommendation for 3 consecutive years.

A Customers’ Choice for 2022 and 2023 - Gartner® Peer Insights™

The reviews and ratings are in!