Category: Application Security
How Much Do You Care About Vendors’ Security?
This morning, ThreatX announced new research focused on the impact companies’ security has on...
VIEW MOREWhy I Joined ThreatX
I was thrilled to join ThreatX as the Chief Revenue Officer a couple months ago because of the...
VIEW MOREThe Evolving MyloBot Botnet
What Is MyloBot? MyloBot is a sophisticated botnet that controls thousands of systems in...
VIEW MOREHow ThreatX Defends Against Multi-Vector API and Application Attacks
We at ThreatX are observing an uptick in multi-vector API and application attacks, or orchestrated...
VIEW MOREHow ThreatX Is Protecting Organizations From Attacks, and From Working Weekends
We’re wrapping up our fiscal year here at ThreatX — always a great time to reflect on...
VIEW MOREThreatX Launches Robust Library of On-Demand Training
ThreatX is pleased to announce the launch of Threat Academy, an extensive library of on-demand...
VIEW MOREOmnichannel Retail: Risks and Benefits
The last two years have rocked the B-to-C world, capping a steady movement towards online shopping....
VIEW MOREPro-Russian Hacker Group, Killnet, Attacking US Government Sites
As the war between Russia and Ukraine rages on, so do the cyberattacks against Ukraine and its NATO...
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREThe Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MOREA Look at Popular Botnets and How to Stop Them
A botnet is simply, as the name implies, a network of bots. Attackers conscript many computers into...
VIEW MORE