Tag: waf
Credential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MOREYour Best First Step in Building an Application Security Program
Application security is critical, and it’s complicated. To be successful, it requires...
VIEW MOREReady for a WAF Alternative? Your Peers Are Too
Holy crap it’s a pain to use. Maybe I just didn’t absorb enough of the...
VIEW MORESustaining our Black Hat Momentum
The ThreatX team had an outstanding two days at Black Hat! Even though we were caught up in the...
VIEW MOREBack in Black [Hat]!
After a brief, pandemic-induced hiatus last year, ThreatX will be attending Black Hat 2021 in...
VIEW MOREWhy Security Teams Need to Virtual Patch
We live in a world where new application security vulnerabilities are discovered daily....
VIEW MORE