Category: Threat Intelligence
Tips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREHow to Stop and Prevent Credit Card Fraud
Who Bears the Cost of CC Fraud? Credit card fraud has been an ongoing problem for online merchants...
VIEW MOREIf all you have is a hammer…
…Everything looks like a nail. There are over a five billion unique user credentials...
VIEW MOREOne stop shop
One of my favorite activities as CEO of ThreatX is participating in meetings with prospects that...
VIEW MOREWinning the battle against blended threats
We’re watching evolution in real-time. The bad guys have industrialized the attack toolbox....
VIEW MOREProtect your Users from Friendly Fire in the War on Bots
In a world where malicious bots roam the internet like hungry lions seeking vulnerable applications...
VIEW MORECredential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
Credential stuffing attacks are some of the most common bot-based threats facing applications...
VIEW MOREDDOS attacks and the 2020 election
Ed Amoroso, Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training,...
VIEW MOREPrune the Sprawl. Get Better AppSec.
“We are all just prisoners here of our own device.“ –The Eagles “Help me...
VIEW MOREWhat Are Bad Bots, and How to Stop Them
With up to 50 percent of Internet traffic generated by bots, organizations are awash in a sea of...
VIEW MOREFive Reasons Agentless AppSec is the Right Choice
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of...
VIEW MORE