Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Account Takeover, SQL Injection and DDoS Attack Simulation on APIs

Overview: According to TechTarget, 94% of organizations experience security problems in production APIs, and one in five suffers a data breach. The primary reason is that most tech leaders assume that having a strong authentication and authorisation framework is enough to secure APIs. As a result, cyberattacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise. Join Karthik Krishnamoorthy, CTO and Vivekanand Gopalan Gopalan, VP of Products at Indusface, in this webinar as they demonstrate how APIs can be hacked.

Growing Attack Surfaces Highlight the Need for Managed Detection and Response Services

One reason organizations have difficulty defending against cyber threats is their attack surfaces are constantly growing, creating more entry points for bad actors to target. And target they will, creating an onslaught of alerts that drive the need for managed detection and response (MDR) services and other measures to help thwart them. Numerous trends are driving the increase in attack surface, including the proliferation of Internet of Things (IoT) devices.

How to Tell When a Cyber Attack is Coming

Predicting when a cyberattack will happen is a lot like forecasting the weather: It’s impossible to know with certainty exactly how events will play out. But with the right strategy and information, you may be able to predict cyberattacks before they start, or catch them in their beginning stages. We explain the early warning signs of each attack technique, as well as how to assess available data to determine how likely a cyber attack is to happen.

Mastering SQL Injection : A Comprehensive Guide to SQL Map

In this video we will learn about one of the most prevalent database threats today, SQL Injection attack which is a common method used by hackers to exploit vulnerabilities in web applications that interact with databases. Join us as we explore the inner workings of this malicious technique and understand how SQLMAP Tool, a powerful open-source penetration testing tool can be used to protect your data. With step-by-step examples and demonstrations, we will show how to install SQLMAP and take countermeasures.

Why Embrace a Cloud Operating Model?

Taking on the concept of a cloud operating model is not just for people who want to be fashionable; it's a clever tactic that any business can use if they desire efficient scaling and better service delivery. This method uses the benefits of cloud computing to make operations simpler, more flexible and less costly.

Evolving Detection Engineering Capabilities with Breach & Attack Simulation (BAS)

Threat actors are constantly updating their tactics, techniques and procedures (TTPs). In response, security teams must also continue to evolve their ability to detect the latest threats to avoid exploitation of security gaps that can result in costly breaches. This process, called detection engineering, refers to the method of fine-tuning security technologies to better detect malicious activity.

How to Use the Terraform Destroy Command to Control Cyber Attack Damage

In many cases, cutting something off is necessary to avoid bigger damage. This is the idea behind controlled infrastructure removal, the elimination of some parts of your cloud infrastructure to contain an attack or remove a potential attack surface. It is an important part of infrastructure-as-code (IaC) management and something organizations need to be familiar with as they secure their cloud environments and the apps they develop.

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

Netskope Threat Labs is tracking multiple phishing campaigns that abuse Cloudflare Workers. The campaigns are likely the work of different attackers since they use two very different techniques. One campaign (similar to the previously disclosed Azorult campaign) uses HTML smuggling, a detection evasion technique often used for downloading malware, to hide the phishing content from network inspection.

What is SQL Injection? SQLI Prevention and Mitigation

SQL Injection is a kind of cyber-attack based on targeted databases by submitting malicious SQL code instead of input on web application fields. This code is created with the purpose of affecting the structure of the database query that the application interacts with the backend database, thus making it vulnerable to hackers who can breach its security, modify data or carry out malicious actions.