Category: Threat Intelligence
ThreatX Response to Spring4Shell
On March 29, 2022, Spring disclosed a zero-day vulnerability – Spring4Shell. A widely used Java...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREHow to Stop and Prevent Credit Card Fraud
Who Bears the Cost of CC Fraud? Credit card fraud has been an ongoing problem for online merchants...
VIEW MOREIf all you have is a hammer…
…Everything looks like a nail. There are over a five billion unique user credentials...
VIEW MOREOne stop shop
One of my favorite activities as CEO of ThreatX is participating in meetings with prospects that...
VIEW MOREWinning the battle against blended threats
We’re watching evolution in real-time. The bad guys have industrialized the attack toolbox....
VIEW MOREProtect your Users from Friendly Fire in the War on Bots
In a world where malicious bots roam the internet like hungry lions seeking vulnerable applications...
VIEW MORECredential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
Credential stuffing attacks are some of the most common bot-based threats facing applications...
VIEW MORE