In the modern application landscape, where businesses are constantly under the threat of cyber attacks, one of the most recent to emerge is HTTP/2 Rapid Reset (CVE-2023-44487), a type of Distributed Denial-of-Service (DDoS) attack. This attack is larger than any…
Category: Blog
Safeguarding Patient Health Data Means Balancing Access and Security
Increased access to health data can leave providers and insurers vulnerable to data breaches, so it?s vital to invest in cybersecurity that can protect networks. This article has been indexed from Blog Read the original article: Safeguarding Patient Health Data…
Imperva defends customers against recent vulnerabilities in Apache OFBiz
On December 26, researchers from SonicWall Capture Labs discovered an authentication bypass vulnerability in Apache OFBiz, tracked as CVE-2023-51467. This bug has a CVSS score of 9.8 and allows attackers to achieve server-side request forgery (SSRF) by bypassing the program’s…
How Cache Purge Helps Keep Your Website Content Fresh and Responsive
Content Delivery Networks (CDNs) accelerate web traffic across the internet through servers residing in strategic locations (known as points of presence or PoPs) across the globe. Each PoP has a number of caching servers, each of which contains a cached…
Akamai?s Responsibility to Our Enterprise Customers
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Responsibility to Our Enterprise Customers
Weaponizing DHCP DNS Spoofing ? A Hands-On Guide
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Weaponizing DHCP DNS Spoofing ? A Hands-On Guide
Shifting from reCAPTCHA to hCaptcha
We are adding another CAPTCHA vendor and helping our customers migrate from Google’s reCAPTCHA to hCaptcha. Why We Are Making This Change We continuously evaluate our security measures to ensure they align with the evolving landscape of threats. After carefully…
The Do?s and Don?ts of Modern API Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Do?s and Don?ts of Modern API Security
Women Can Make a Difference in the Field of Data Science
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Women Can Make a Difference in the Field of Data Science
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
Novel Detection of Process Injection Using Network Anomalies
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Novel Detection of Process Injection Using Network Anomalies
The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
CVE-2023-50164: A Critical Vulnerability in Apache Struts
On December 7, 2023, Apache released a security advisory regarding CVE-2023-50164, a critical vulnerability in Apache Struts with CVSS score 9.8. Versions from 2.5.0 to 2.5.32 and 6.0.0 to 6.3.0 were affected. Apache Struts is a popular, free, open-source framework…
How to Defend Against Digital Cyberthreats This Holiday Season
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Defend Against Digital Cyberthreats This Holiday Season
Akamai?s Perspective on December?s Patch Tuesday 2023
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai?s Perspective on December?s Patch Tuesday 2023
CVE-2023-22524: RCE Vulnerability in Atlassian Companion for macOS
TL;DR This blog unveils a remote code execution vulnerability, identified as CVE-2023-22524, in Atlassian Companion for macOS, which has recently been patched. This critical vulnerability stemmed from an ability to bypass both the app’s blocklist and macOS Gatekeeper, potentially allowing…
What We’ve Learned from Media Cloud Adoption Trends
Read the top takeaways from a global survey of leaders in the media and entertainment industry about their cloud adoption experiences and challenges. This article has been indexed from Blog Read the original article: What We’ve Learned from Media Cloud…
Imperva Detects Undocumented 8220 Gang Activities
Imperva Threat Research has detected previously undocumented activity from the 8220 gang, which is known for the mass deployment of malware using a variety of continuously evolving TTPs. This threat actor has been known to target both Windows and Linux…