Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconJanuary 31, 2024
Clock Icon 7 min Read
CSRF Attacks: Risk Analysis, Protection, and Anti-CSRF Tokens

CSRF (Cross-Site Request Forgery) exploits authenticated user sessions by tricking web browsers into sending unauthorized requests to targeted websites.

Read More...
Calender IconJanuary 25, 2024
Clock Icon 8 min Read
SYN Flood Attack: The What, Impact, and Prevention Methods

A SYN flood is a type of DDoS attack where the attacker overwhelms a server with excessive SYN requests, causing resource exhaustion and service disruption.

Read More...
Calender IconJanuary 22, 2024
Clock Icon 2 min Read
A Step-by-step Guide to URL Verification in Indusface WAS

Secure your Indusface WAS vulnerability scan with our guide to URL verification. Confirm ownership and prevent unauthorized access in 3 simple methods

Read More...
Calender IconJanuary 17, 2024
Clock Icon 6 min Read
What is XML-RPC? Benefits, Security Risks, and Detection Techniques

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This may facilitate various attacks

Read More...
Calender IconJanuary 17, 2024
Clock Icon 9 min Read
API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP

By identifying & cataloging in-use APIs, API discovery enables organizations to assess security risks associated with each API upon inventory creation.

Read More...
Calender IconJanuary 16, 2024
Clock Icon 4 min Read
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)

The Apache OfBiz ERP system is found to have a zero day flaw (CVE-2023-51467) that may lead to unauthorized access. Explore the impact & patch details.

Read More...
Calender IconJanuary 12, 2024
Clock Icon 7 min Read
What is Vulnerability Testing? Benefits, Tools, and Process

Vulnerability testing systematically identifies and evaluates weaknesses in digital systems, enabling proactive cybersecurity measures and threat mitigation.

Read More...
Calender IconJanuary 5, 2024
Clock Icon 6 min Read
5 Website Security Threats and How to Prevent Them

The volume, size, sophistication, and impact of website security threats are fast increasing, making their prevention imperative. Read more.

Read More...
Calender IconDecember 22, 2023
Clock Icon 17 min Read
35 Most Notorious Hacks in History that Fall Under OWASP Top 10

What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of them, which would be strong candidates for the title.

Read More...
Calender IconDecember 21, 2023
Clock Icon 2 min Read
Apache Struts 2 Vulnerability CVE-2023-50164 Exposed

The latest vulnerability CVE-2023-50164 disclosed on Apache Struts affects the Struts 2 framework’s file upload logic, allowing unauthorized path traversal.

Read More...
Calender IconDecember 21, 2023
Clock Icon 10 min Read
How Does a WAF Work?

A Web Application Firewall (WAF) enhances cybersecurity by filtering and blocking malicious traffic, protecting web applications from attacks like SQLi and XSS.

Read More...
Calender IconDecember 18, 2023
Clock Icon 4 min Read
Understanding the Zimbra Cross-Site Scripting Flaw (CVE-2023-37580)

The Zimbra XSS vulnerability allows an attacker to impact the confidentiality and integrity of the user’s data. Understand how to find & fix this flaw.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!