Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Indusface

What is XML External Entity, How to Find XXE Vulnerabilities and Patch Them

An XXE vulnerability is a security vulnerability that allows attackers to access sensitive data or execute malicious code in a web application. This happens when the application accepts XML input from an untrusted source and doesn’t properly validate it. An attacker can exploit this vulnerability by crafting a special XML input that includes a reference to an external resource (like a file or URL) that they control.

Zero-day Vulnerability - Examples, Detection & Prevention [+ Monthly 0-day Reports]

Unknown threats are the real risk. One such example is, Zero-day vulnerability, having been used in real-time attacks but not yet disclosed by the software vendor. In 2023 alone, 3324 zero-day vulnerabilities were identified in websites protected by AppTrana WAAP, highlighting the urgency of understanding and addressing these risks. This blog delves into the essence of zero-day vulnerabilities, exploring how they operate and crucial best practices to defend against potential exploitation.

17 Best Cloud WAAP & WAF Software in 2024

A web application firewall is a security software that observes and filters HTTP/HTTPS traffic between a web application and the internet. While this has been available for decades, with the evolution of the threat landscape, WAFs have also added additional capabilities to protect not only web apps but also APIs against a range of attacks, including DDoS and bot attacks. So, the category has evolved and is currently called Web Application and API Protection (WAAP).

Autonomous Patching in 72 Hours: Understanding SwyftComply on AppTrana WAAP

To comply with the security audit requirements of SOC 2, PCI, and others, your application audit report should have zero open vulnerabilities. Most companies perform these audits at least annually, and the audits are more frequent for highly regulated industries such as finance and healthcare. However, 31% of critical and high vulnerabilities remain open after 180 days – according to The State of Application Security.

CSRF Attacks: Risk Analysis, Protection, and Anti-CSRF Tokens

Cross-Site Request Forgery (CSRF) remains a continuing threat, exposing user data and application integrity. However, with proactive measures like anti-CSRF tokens and additional defenses, you can protect your applications against CSRF attacks. Let’s delve into the depths of CSRF vulnerabilities and explore practical strategies to boost your web application security.

SYN Flood Attack: The What, Impact, and Prevention Methods

The Mirai Botnet, famous for massive DDoS attacks, used SYN flood techniques to hack 600,000 IoT devices. Targets like KrebsOnSecurity, Lonestar cell, and Dyn. The impact cascaded across key service providers that relied on Dyn’s services, affecting entities such as Sony Playstation servers, Amazon, GitHub, Netflix, PayPal, Reddit, and Twitter.

Introducing SwyftComply - Get Clean, Zero-Vulnerability Report in 72 Hours

SOC 2, ISO270001, PCI, and other regional laws require you to have a clean, zero-vulnerability report. That said, even critical vulnerabilities take 250+ days to patch, especially when these exist in third-party plug-ins, open-source libraries, or legacy code. Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month.

A Step-by-step Guide to URL Verification in Indusface WAS

To initiate an Indusface WAS vulnerability scan on your URL, confirming ownership of the URL or domain being scanned is essential. This verification is an additional security measure to prevent unauthorized users from conducting scans on your URL or domain and revealing potential vulnerabilities. There are 3 different methods to verify your URL.

What is XML-RPC? Benefits, Security Risks, and Detection Techniques

XML-RPC is a powerful and versatile protocol in the ever-evolving web development and data communication landscape. XML-RPC, which stands for Extensible Markup Language – Remote Procedure Call, provides a standardized way for software applications to communicate over the Internet. XML-RPC for PHP is affected by a remote code-injection vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the webserver context.

Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)

Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterprise Resource Planning (ERP) system, CVE-2023-51467. The zero-day vulnerability CVE-2023-51467 poses a significant threat, boasting a CVSS score of 9.8. This authentication bypass vulnerability stems from an incomplete patch for a previously disclosed Pre-auth Remote Code Execution (RCE) vulnerability, CVE-2023-49070.