August 7, 2014
3 min ReadThe Great Cyber Robbery by Russian hackers
A Russian gang has stolen 1.2 bn usernames and passwords and this is being quoted as the biggest cyber robbery that anyone has ever witnessed. The News of this discovery.
Read the Latest State of Application Security Report (H1 2025) and Stay Ahead of Threats: Download now!
August 7, 2014
3 min ReadA Russian gang has stolen 1.2 bn usernames and passwords and this is being quoted as the biggest cyber robbery that anyone has ever witnessed. The News of this discovery.
August 1, 2014
4 min Readby Venkatesh Sundar, Chief Technology Officer, Indusface Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper.
July 28, 2014
3 min ReadMass infection of nearly 50,000 websites has been reported. A recently patched vulnerability in the popular newsletter plug-in MailPoet for WordPress has been cited as the reason behind the hack..
July 25, 2014
3 min ReadThe CISOs are trying their level best to cope with the rising and unique nature of cyber threats. In the present times, each and every CISO conscious of their organization’s.
July 24, 2014
3 min ReadWAF have been a critical part of securing external facing websites for years now. Here are 7 best habits for highly effective WAF.
July 22, 2014
2 min ReadGameover Zeus first appeared in September 2011. FBI had held Gameover Zeus botnet responsible for the theft of more than $100 mn, since then.
July 16, 2014
3 min ReadThe rising trend in cyber-crimes against Indian establishments has urged the Government to toughen its stand. The Centre has ordered security auditing of the entire IT infrastructure of the central.
July 11, 2014
4 min ReadAttackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes using sensitive data exposure.
July 7, 2014
3 min ReadAccording to the recent actions of technology heavy weight Microsoft, if a company operates insecure infrastructure, that is repeatedly used to spread malicious software, they could seize the underlying assets..
July 4, 2014
3 min Read90% of the top mobile banking apps have been found to have serious security flaws. Securing your mobile applications is not an option anymore, but a necessity.
July 3, 2014
3 min ReadCross Site Request Forgery forces an end user to execute unwanted actions on a web application in which he is currently authenticated.
June 27, 2014
3 min ReadDDoS attacks have rapidly become hacker’s choice of attack, with evidently many major businesses falling at the receiving end.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™