Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconApril 4, 2014
Clock Icon 6 min Read
What is Broken Authentication & How to Prevent it?

To prevent Broken Authentication vulnerability, use strong password policies, implement multi-factor authentication, and regularly monitor user activity.

Read More...
Calender IconMarch 28, 2014
Clock Icon 5 min Read
Offline, yet still exploited

The Hacker Series By Bhaumik Merchant, Information Security Research Consultant, Indusface Introduction: This article demonstrates a unique kind of communication technique between an attacker machine and a victim machine during.

Read More...
Calender IconMarch 21, 2014
Clock Icon 2 min Read
Top 3 Critical Vulnerabilities in Web Applications

From Indusface’s study on the State of Application Security in India, here are the top critical vulnerabilities that affect your web applications.

Read More...
Calender IconMarch 14, 2014
Clock Icon 3 min Read
Detect Web Application Attacks Using Web Server Access Logs

Recently, I was conducting a security audit for an organization. They had deployed a WAF (Web Application Firewall) for their critical web apps. However, when I asked them about the.

Read More...
Calender IconMarch 7, 2014
Clock Icon 3 min Read
How to Test for SQL Injection Vulnerabilities

UNDERSTANDING OWASP TOP 10 SERIES and how to test SQL injection vulnerabilities Open Source Web Application Consortium releases its list of top 10 web vulnerabilities, every three years. The second.

Read More...
Calender IconFebruary 28, 2014
Clock Icon 3 min Read
State of Website Defacement in India

Website defacement is the electronic graffiti of choice for most “Hacktivists” these days. According to Wikipedia – Website defacement is “an attack on a website that changes the visual appearance.

Read More...
Calender IconFebruary 19, 2014
Clock Icon 2 min Read
OWASP Top 10 Vulnerabilities 2013

By Client Services Team, Indusface

Read More...
Calender IconFebruary 5, 2014
Clock Icon 3 min Read
WAF Signatures

SQL injection is one of the deadliest because it has the potential of retrieving the whole database from the web server. See how WAF signatures can help.

Read More...
Calender IconJanuary 28, 2014
Clock Icon 6 min Read
How To Prevent XSS Attacks?

One of the largest portals was in news recently when their website was exploited by targeting a XSS vulnerability. Are you safe?

Read More...
Calender IconJanuary 22, 2014
Clock Icon < 1 min Read
PCI 3.0 – Going beyond compliance

The PCI Security Standards Council (PCI SSC) has recently published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) for debit and.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!