Discover the 76% : The API Traffic Your Security Tools Never See - Register Now !

Live Intelligence

Security Intelligence for Modern Threats

Real-time vulnerability analysis, threat intelligence, and expert insights to protect your infrastructure from emerging attacks.

API attacks surged 74× in 2025, making web & API security a business-critical priority for every organisation.

Loading…
insecure infrastructure

If you operate insecure infrastructure – Microsoft may seize it for “greater-good”

According to the recent actions of technology heavy weight Microsoft, if a company operates insecure infrastructure, that is…

Mobile Banking Apps are Vulnerable

90% of Mobile Banking Apps are Vulnerable

90% of the top mobile banking apps have been found to have serious security flaws. Securing your mobile…

Cross Site Request Forgery

Cross Site Request Forgery (CSRF): The Sleeping Giant in Hackers’ World

Cross Site Request Forgery forces an end user to execute unwanted actions on a web application in which…

Has DDoS become the hacker’s No. 1 choice of attack

Has DDoS become the hacker’s No. 1 choice of attack?

DDoS attacks have rapidly become hacker’s choice of attack, with evidently many major businesses falling at the receiving…

Twitter’s TweetDeck Hacked

And so the breaches continued: Twitter’s TweetDeck Hacked

TweetDeck, the popular social media dashboard application for management of Twitter accounts, had to be temporarily shut down…

Dinner with DDoS Attack

Dinner with an Application Distributed Denial of Service (DDoS) Attack

Indusface’s Customer – Victim of Application DDoS: Have you ever experienced a live DDoS attack on your website?…

OpenSSL MITM CCS vulnerability

OpenSSL MITM CCS vulnerability and its impact

Within weeks of the infamous Heartbleed vulnerability in one of the world’s most commonly used open-source software OpenSSL,…

New Zero-Day Vulnerability

New Zero-Day Vulnerability found in Internet Explorer: Targeting Versions 6 to 11

New critical zero-day vulnerability found in Internet Explorer 6 to 11- this is the news that we woke…

Post Heartbleed

Post Heartbleed, now what?

It’s been over two weeks since the world learned that websites online were vulnerable due to the OpenSSL…

Implications of Heartbleed Bug

Larger implications of Heartbleed

I was looking at Heartbleed bug code and it appears that it is not a buffer overflow. Rather,…

Real time, continuous detection, defense and protection from Heartbleed by Indusface

Real time, continuous detection, defense and protection from Heartbleed by Indusface

The day the world got to know of Heartbleed, is going to be a day that security professionals,…

Seacurity Heartache - Heartbleed

Security heartache: OpenSSL Heartbleed

On April 7th, a major vulnerability in OpenSSL, the most prevalent software used for encryption and other purposes on…

🔍

No articles found

No posts in this category.

Over 60% of web attacks now target APIs — making API security a top priority for every security team.

Get weekly threat intelligence

Join 51,000+ security leaders receiving real-time alerts and analysis