Guardians of the Enterprise — Insights from leading cyber experts.

Listen Now →
Live Intelligence

Security Intelligence for Modern Threats

Real-time vulnerability analysis, threat intelligence, and expert insights to protect your web, API and AI agents from emerging attacks.

API vulnerability exploitation jumped 181% in 2025  accelerated by LLM-assisted tooling.
Loading…
5 Most Shared Application Security Posts in 2016

5 Most Shared Application Security Posts in 2016

As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security.…

Security Lessons Learned in 2016

Security Lessons Learned in 2016

More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media…

How Secure Are Your Apps in Cloud?

How Secure Are Your Apps in Cloud?

Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and…

How to Secure WordPress Website from Hackers?

How to Secure WordPress Website from Hackers?

Today, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67…

DLL Hijacking and How It Is Done?

DLL Hijacking and How It Is Done?

Windows application comprises of various folders and files. These files includes executables, dll and various other formats. A…

Application Security for Startups and SMEs

Application Security for Startups and SMEs

Despite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium…

Yahoo Data Breach: Can It Affect Your Business?

Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half…

What Are Automated Attacks?

What Are Automated Attacks?

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Availability of BYOL option for TAS in AWS

Availability of BYOL option for TAS in AWS

I am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As…

20 Website Security Stats from 2016

20 Website Security Stats from 2016

What a year it has been so far. With millions of records stolen and thousands of dollars spent…

DDoS Attack Protection Online on Websites

DDoS Attack Protection Online on Websites

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application…

31 Google URLs Vulnerable to Open Redirect

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP…

DDoS attacks on APIs were 675% higher  than on websites in 2025. API gateways handle routing, not adversarial security.

Get weekly threat intelligence

Join 51,000+ security leaders receiving real-time alerts and analysis