Tag: Application & Hybrid Cloud Security
How to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MORECredential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MOREThe Evolving MyloBot Botnet
What Is MyloBot? MyloBot is a sophisticated botnet that controls thousands of systems in...
VIEW MOREHow ThreatX Defends Against Multi-Vector API and Application Attacks
We at ThreatX are observing an uptick in multi-vector API and application attacks, or orchestrated...
VIEW MOREHow ThreatX Is Protecting Organizations From Attacks, and From Working Weekends
We’re wrapping up our fiscal year here at ThreatX — always a great time to reflect on...
VIEW MOREThreatX Launches Robust Library of On-Demand Training
ThreatX is pleased to announce the launch of Threat Academy, an extensive library of on-demand...
VIEW MOREOmnichannel Retail: Risks and Benefits
The last two years have rocked the B-to-C world, capping a steady movement towards online shopping....
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MORE