Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

3 Types of Bot Attacks to Guard Against

Bot attacks constitute a major danger to businesses and individuals. For five consecutive years, the percentage of global web traffic connected to bad bots has increased, reaching 32% in 2023, a 1.8% increase from 30.2% in 2022, while human traffic represented only 50.4%. These nefarious bots are designed to breach a system, access confidential files illegally, and disrupt normal operations, which leads to severe financial and reputational consequences.

Global Cyber Attacks See Highest Increases in the Last Two Years

New analysis of Q2 2024 cyber attacks shows the number of attacks experienced weekly by organizations globally is on the rise. Each quarter, Check Point Research puts out a quarterly report covering what cyber attack activity they’re seeing globally. Their latest report covering Q2 of 2024 highlights an unexpected rise in overall attack numbers.

What is an account takeover?

Whether you’re a Halloween or comic con fan, dressing up as your favorite character is something you’ve probably done at least once in your life. As a kid, you were excited to put on that flimsy Batman mask and cape, thinking you looked just like the hero you saw on the movie screen. As an adult, getting or making the most move-accurate costume may allow other people to think that you are the actor in disguise.

Low-DDoS Attack Live Simulation

Million+ unique IPs hit your web or API server with one or two requests per minute. Default rate-limits fail immediately, and your server is down. 50% of the DDoS attacks employ botnets for launching such attacks. In this live attack simulation, join Karthik Krishnamoorthy (CTO of Indusface) and Vivek Gopalan (VP of Products of Indusface), as they demonstrate advanced AI-powered DDoS mitigation while minimizing false positive blocks.

Over 1 Million websites are at risk of sensitive information leakage - XSS is dead. Long live XSS

Cross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular web vulnerabilities. Since its first emergence, somewhere in the dark days of the internet, countless vulnerabilities have been found across websites everywhere. Therefore, it comes as no surprise that XSS has been consistently highlighted as a top risk in the OWASP TOP-10 since the list's very first iteration in 2004!

Nearly All Ransomware Attacks Now Include Exfiltration of Data...But Not All Are Notified

Organizations are falling victim to ransomware attacks where data is stolen, but the victim isn’t being told about it. I have a theory as to why this is happening. Many assume data is being exfiltrated as part of a ransomware attack and it’s going to be used as part of the extortion component of the attack. But according to Arctic Wolf’s The State of Cybersecurity: 2024 Trends Report, that doesn’t seem to be the case.

OLYMPICS 2024: When Cybercriminals Enter the Arena

As the Paris 2024 Summer Olympics approaches, concerns have surfaced over the heightened threat of cyberattacks during and preceding the games. The international attention makes it a prime target for malicious actors looking to engage in cyberespionage, make political statements, or generate profits.

How Salt Catches Low and Slow Attacks While Others Can't

In the ever-evolving landscape of cybersecurity, API attacks pose significant threats to organizations. These attacks, particularly the low and slow variety, are notoriously challenging to detect and mitigate. Salt Security stands out as the premier solution for identifying and addressing these sophisticated threats, setting a benchmark that competitors struggle to match. Here’s why Salt Security is unparalleled in catching low and slow API attacks.

How to Protect Your Business in the Aftermath of a Cyber Crime

The threat of cybercrime looms large over today's digital business landscape. From small startups to established enterprises, no organization is immune to this escalating threat. When a cyberattack occurs, the aftermath can be devastating and disorienting, but the steps taken in the immediate aftermath can significantly determine the business's recovery and future resilience.