Indusface Blog
392 FOLLOWERS
Learn the latest updates on web application security, web application scanning, WAF, DDoS attacks and CDN. Stay secure with Indusface. Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.
Indusface Blog
9M ago
How do you approach bot management? For certain businesses, the optimal approach could involve selecting a single bot management software to meet their existing bot detection and management needs.
For some companies, combining behavioural analytics for identifying malicious bot behaviour and a WAF (WAAP) to defend against vulnerability exploits, DDoS attacks, and API security breaches is essential.
This blog offers an extensive overview of the top bot management software available in the market for 2024, encompassing both standalone and bundled options.
Why Do You Need Bot Management Software ..read more
Indusface Blog
9M ago
Introduction to WAF and WAAP
A web application firewall is a security software that observes and filters HTTP/HTTPS traffic between a web application and the internet.
While this has been available for decades, with the evolution of the threat landscape, WAFs have also added additional capabilities to protect not only web apps but also APIs against a range of attacks, including DDoS and bot attacks.
So, the category has evolved and is currently called Web Application and API Protection (WAAP).
Even in this article, you will notice that most players listed were operating in the WAF ..read more
Indusface Blog
9M ago
To comply with the security audit requirements of SOC 2, PCI, and others, your application audit report should have zero open vulnerabilities.
Most companies perform these audits at least annually, and the audits are more frequent for highly regulated industries such as finance and healthcare.
However, 31% of critical and high vulnerabilities remain open after 180 days – according to The State of Application Security.
Reasons for open vulnerabilities include inherited ones in an open-source platform like Apache or a third-party WordPress plug-in your team uses. There could also be a zero-day v ..read more
Indusface Blog
10M ago
To initiate an Indusface WAS vulnerability scan on your URL, confirming ownership of the URL or domain being scanned is essential.
This verification is an additional security measure to prevent unauthorized users from conducting scans on your URL or domain and revealing potential vulnerabilities.
There are 3 different methods to verify your URL:
Email Verification: Confirm ownership by matching the entered email with the provided domain.
Meta Tag Verification: Add a unique Meta Tag to the homepage’s head section for authentication.
HTML File Upload Verification: Upload a unique HTML file to t ..read more
Indusface Blog
10M ago
Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterprise Resource Planning (ERP) system, CVE-2023-51467.
The zero-day vulnerability CVE-2023-51467 poses a significant threat, boasting a CVSS score of 9.8. This authentication bypass vulnerability stems from an incomplete patch for a previously disclosed Pre-auth Remote Code Execution (RCE) vulnerability, CVE-2023-49070.
Recognizing the system’s wide install base, attackers have exploited this flaw with large-scale attempts.
This blog delves into the details of these vulnerabilities, shedding ..read more
Indusface Blog
10M ago
XML-RPC is a powerful and versatile protocol in the ever-evolving web development and data communication landscape.
XML-RPC, which stands for Extensible Markup Language – Remote Procedure Call, provides a standardized way for software applications to communicate over the Internet.
XML-RPC for PHP is affected by a remote code-injection vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the webserver context. This may facilitate various attacks, including unauthorized remote access.
Find this vulnerability on your site with Free Website Security Scan.
In t ..read more
Indusface Blog
11M ago
If your device suddenly behaves like a re-animated zombie, you might be under a Botnet attack.
Also known as a zombie army, these attacks involve hijacking internet-connected devices infected with malware, controlled remotely by a single hacker. The scale of these attacks is immense, as demonstrated by a cyber assault that exploited 1.5 million connected cameras to overwhelm and take down a journalist’s website.
As the IoT market grows exponentially, reaching 75.4 billion devices by 2025, the need for robust botnet detection and removal becomes critical for digital safety.
How Does a Botnet At ..read more
Indusface Blog
11M ago
On December 7th, 2023, the Apache Struts project disclosed a significant vulnerability, CVE-2023-50164, in its Struts 2 open-source web framework. Rated at a critical CVSS score of 9.8, this flaw resides within the framework’s file upload logic.
Exploiting this vulnerability empowers attackers to manipulate upload parameters, potentially leading to arbitrary file upload and, under specific conditions, code execution.
The popularity of Apache Struts in handling complex application requirements has made it a critical component in the global web application infrastructure.
Used by numerous Fortun ..read more
Indusface Blog
11M ago
On November 16, 2023, Google’s Threat Analysis Group revealed an alarming vulnerability in Zimbra Collaboration—a reflected cross-site scripting (XSS) vulnerability assigned CVE-2023-37580.
The Zimbra Collaboration Suite (ZCS) is a software platform that combines email, calendar, contacts, file sharing, and other collaboration tools into a single integrated package.
The CVE-2023-37580 allows an attacker to inject a malicious script directly into the URL parameter. The attacker’s code gets embedded within the application’s response, which is then sent back to the user’s ..read more
Indusface Blog
11M ago
Amidst the ongoing surge in cyber threats, CISOs are encountering increasing challenges in their responsibilities.
During a recent CISO Panel Discussion on Application Security hosted by our CEO, Ashish Tandan, CISOs Kiran Belsekar from Aegon Life and Manoj Srivastava from Future Generali expressed concerns about managing security postures and shared actionable strategies to tackle evolving threats.
The blog covers the excerpts from the discussion, highlighting CISO challenges and best practices to follow in 2024:
AppSec Quarterly Report Insights
Based on the findings from our quarterly report ..read more