Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Remote Unauthenticated API Access Vulnerabilities in Ivanti

Ivanti has warned users of its Endpoint Manager Mobile (EPMM) mobile device management (MDM) platform, urging immediate actions to address two vulnerabilities – including a zero-day exploit. These vulnerabilities can potentially be exploited by an unauthorized attacker, leading to unauthorized access to sensitive data and the execution of malicious actions on the affected system.

Top Akamai WAF Alternatives in 2023

As one of the pioneering WAF products, Akamai remains a crucial player in the modern WAAP landscape. Akamai was among the earliest CDNs introduced and continues to dominate content delivery. Its excellence is further validated by being rated a Leader in Gartner’s Magic Quadrant for Cloud Web Application and API Protection in 2022.

API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP

The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches reveals that US companies could face losses ranging from $12 billion to $23 billion in 2022 due to compromises linked to APIs. Lack of visibility plays a major role in the rise of API breaches. The lack of visibility inherently creates blind spots. How do you overcome the problem of hidden APIs?

Adobe ColdFusion Vulnerabilities Exploited in the Wild

Adobe ColdFusion, a popular web development platform, has been targeted by malicious actors exploiting the recently disclosed vulnerabilities, including severe CVE-2023-29300. The exploit has been observed in the wild, posing a significant risk to organizations and individuals relying on the software. Here is an in-depth analysis of these vulnerabilities, including their potential impacts and vital protective measures to protect against these attacks.

SIEM Integration on the Indusface WAS

Indusface WAS integrates with all major Security Information & Event Management (SIEM) providers that integrate with Amazon S3. With this integration, you can push logs from Indusface WAS into leading SIEM providers like SumoLogic, RSA, Splunk, and McAfee. Given the complexity of modern architectures encompassing multiple security devices and environments, organizations increasingly rely on SIEM solutions.

Cloudflare Alternatives for Cloud WAF in 2023

Cloudflare is a leading global web infrastructure and cybersecurity company. Founded in 2009, Cloudflare provides a wide range of products and services designed to improve websites’ and internet applications’ performance, reliability, and security. One of Cloudflare’s primary focuses is on security.

What is Vulnerability Testing? Benefits, Tools, and Process

Software vulnerabilities are the most significant security risks organizations face today, and several critical vulnerabilities have been identified in 2023, including Apache Superset, Papercut, and MOVEit SQL Injection vulnerabilities. In the first quarter of 2023, AppTrana detected 24,000 vulnerabilities across 1,400+ sites.

iOS Application Penetration Testing Checklist [153 Test Cases in a Free Excel File]

Get Free iOS Application Penetration Testing Checklist Apple’s recent release of iOS 16 for the iPhone brings important new security features. Despite the inherent security features of iOS, additional measures, techniques, and guidelines can be employed to fortify the protection of user data and ensure privacy. Having previously covered the Android penetration testing checklist and security assessment, it is time to focus on iOS.