Preparing for PCI DSS 4.0.1: What You Need to Know
The release of PCI DSS 4.0.1 marks a significant evolution in payment security standards. As...
VIEW MOREClosing the Gap: How ThreatX Protects Against Evolving WAF Bypass Techniques
The Zafran Research Team’s recent findings have sent shockwaves through the cybersecurity...
VIEW MOREProactive Measures in Light of CVE-2024-3094
CVE-2024-3094 was disclosed on March 28, 2024, and with a critical impact rating and a CVSS score...
VIEW MOREAPI and App Security: Q4 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREQ3 ThreatX Platform Data: Spotlight on the Banking Industry
In our recent analysis of our Q3 platform data, we found that the banking industry stood out in a...
VIEW MOREAPI and App Security: Q3 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREAddressing the HTTP/2 Rapid Reset Attack Vulnerability
A recent disclosure pinpointed a vulnerability in the HTTP/2 protocol (CVE-2023-44487), which under...
VIEW MORETwo Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that...
VIEW MOREOpenSSL Vulnerability
On October 26, the OpenSSL Project announced the discovery of a critical vulnerability, and that a...
VIEW MOREChallenges of Stopping Bot-Based API Attacks
Bots are increasingly making life more difficult for security teams. Attacks against APIs and web...
VIEW MOREHTTP Request Smuggling Vulnerability in Node.js
Last week, researchers discovered an HTTP request smuggling vulnerability in Node.js. This...
VIEW MOREHow Attackers Are Using Bots to Breach APIs
APIs have become very popular attack targets, and almost all the attacks we see against API...
VIEW MORE