Meet us at RSAC 2025! Grab your FREE Expo Pass – Claim Now!

Indusface Blog

Calender IconSeptember 25, 2014
Clock Icon 3 min Read
How Not to Get BASH-ed

A major vulnerability in the Bourne Shell — called bash shell – has come to the fore. This vulnerability existed from a long time.

Read More...
Calender IconSeptember 23, 2014
Clock Icon 3 min Read
Cybercriminals Piggybacking on Google’s DoubleClick for Rapid Distribution

As per a latest report, Cybercriminals have exploited the power of two online advertising networks, Google’s DoubleClick and popular Zedo advertising agency.

Read More...
Calender IconSeptember 22, 2014
Clock Icon 6 min Read
Gmail hacked- how to check if your account is safe?

By Indusface Research Team As per some reports, Gmail has been hacked and 5 million user names and passwords were stolen from compromised accounts. What does this mean for you?.

Read More...
Calender IconSeptember 12, 2014
Clock Icon < 1 min Read
State of Application Security in India

Read More...
Calender IconSeptember 10, 2014
Clock Icon 5 min Read
After iCloud massacre, it’s time to re-visit the tips to secure your data on Cloud

Hollywood stars are all over the internet, and not because of Emmys, but because some nut job stole their nude photos and leaked them online. From cloud…nope, iCloud! I can.

Read More...
Calender IconSeptember 8, 2014
Clock Icon 5 min Read
Big Data Requires Bigger Security, But Is It As Complex As It Dounds?

Discover the essence of Big Data and essential tips for safeguarding your valuable information in this comprehensive guide.

Read More...
Calender IconSeptember 2, 2014
Clock Icon 4 min Read
OWASP A9 Using Components with Known Vulnerabilities

The use of 3rd party frameworks and libraries in application development has become a very common practice but unfortunately most of the time, proper security policies aren’t implemented to mitigate the.

Read More...
Calender IconAugust 22, 2014
Clock Icon 3 min Read
Heartbleed still bleeding your security?

Google and Codenomicon were responsible for finding the Heartbleed bug which had remained hidden for more than two years.

Read More...
Calender IconAugust 20, 2014
Clock Icon 4 min Read
How to secure Internet of Things?

The world we live in today is connected 24*7, with people always being attached to technology, even when on the move. And what is taking this mobile connectivity to another.

Read More...
Calender IconAugust 19, 2014
Clock Icon 2 min Read
How can Ebola infect your PC?!

In March 2014, the WHO reported a major Ebola outbreak in Guinea, it is the largest ever documented, and the first recorded in the region.

Read More...
Calender IconAugust 18, 2014
Clock Icon 3 min Read
How much would you spend to get 1% more from Google?

As per the latest report of Net Market Share Google holds, around 68% of Search Engine Market Share followed by Baidu are at 11% and Yahoo at 6.65%. Know more

Read More...
Calender IconAugust 13, 2014
Clock Icon 3 min Read
OWASP Security Misconfiguration Vulnerability

Application Security Misconfiguration attacks exploit configuration weaknesses found in web applications. Find out how this happens.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!