Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconOctober 1, 2024
Clock Icon 3 min Read
RCE Zero Day Vulnerabilities in CUPS Put Linux Systems at Risk

CUPS RCE Vulnerabilities (CVE-2024-47076, CVE-2024-47177, CVE-2024-47175, CVE-2024-47176) put systems at risk of remote attacks through malicious printers.

Read More...
Calender IconSeptember 27, 2024
Clock Icon 8 min Read
How do Compliance Regulations Drive Application Security?

Explore how compliance standards like PCI DSS, SOC 2, and GDPR enhance application security by enforcing specific requirements to protect sensitive data.

Read More...
Calender IconSeptember 24, 2024
Clock Icon 3 min Read
CVE-2024-8190 – OS Command Injection in Ivanti CSA

Learn about CVE-2024-8190, an OS command injection vulnerability in Ivanti CSA. Discover how it allows remote code execution and ways to protect your system.

Read More...
Calender IconSeptember 13, 2024
Clock Icon 3 min Read
CVE-2024-8517 – Unauthenticated Remote Code Execution in SPIP

A command injection flaw (CVE-2024-27348) in SPIP allows remote attacks without authentication. Learn mitigation steps & how AppTrana provides Day 0 protection.

Read More...
Calender IconSeptember 13, 2024
Clock Icon 5 min Read
Top 8 Vulnerability Management Challenges and How to Overcome Them

Uncover top vulnerability management challenges & where organizations go wrong in addressing security gaps. Learn effective strategies to overcome these issues.

Read More...
Calender IconAugust 30, 2024
Clock Icon 5 min Read
How Frequently Should We Run a Vulnerability Scan?

Understand how to determine the perfect frequency for vulnerability scans. Protect critical systems, manage risks, and maintain compliance effectively.

Read More...
Calender IconAugust 30, 2024
Clock Icon 5 min Read
Understanding OWASP Top 10 Client-Side Risks

Understand the OWASP Top 10 Client-Side Risks, common vulnerabilities in client-side code, and practical strategies to mitigate these threats effectively.

Read More...
Calender IconAugust 26, 2024
Clock Icon 4 min Read
Formjacking Attacks – How They Work and How to Prevent Them

Discover Formjacking attacks, their impact on businesses, effective prevention strategies, and PCI DSS 4.0 requirements for client-side security compliance.

Read More...
Calender IconAugust 23, 2024
Clock Icon 6 min Read
Magecart Attack – Techniques, Examples & Preventions

What is a Magecart Attack? Magecart attacks are a form of digital skimming that targets insecure websites to steal payment information. These attacks involve injecting malicious JavaScript code into e-commerce.

Read More...
Calender IconAugust 22, 2024
Clock Icon 5 min Read
8 Types of Cyberattacks a WAF is Designed to Stop

8 common types of cyberattacks a WAF is designed to stop. Indusface WAF allows custom rules, prevents business logic flaws, assures zero false positives.

Read More...
Calender IconAugust 14, 2024
Clock Icon 5 min Read
CVE-2024-38856 –Apache OFBiz Pre-Auth RCE Vulnerability

A new zero-day vulnerability, CVE-2024-38856, has been discovered in the Apache OFBiz open-source enterprise resource planning (ERP) platform, presenting a critical threat to businesses worldwide. This pre-authentication remote code execution.

Read More...
Calender IconAugust 1, 2024
Clock Icon 3 min Read
Hotjar’s OAuth+XSS Flaw Exposes Millions at Risk of Account Takeover

Hotjar’s OAuth+XSS flaw risks millions. Attackers exploit this vulnerability with deceptive links, exposing user data and leading to potential takeovers.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!