What is Customer Journey Hijacking?
Learn about customer journey hijacking--malicious attacks that cause lost customers and reduced business revenue--and how to stop them. The post What is Customer Journey Hijacking? appeared first on Feroot ... Read More
Everything You Need to Know About Client-side Attack Surface Monitoring
To properly protect web applications and web pages from client-side attacks, cybersecurity professionals and web application developers have a few approaches available to them. If you’ve been following the Feroot blog, you will have learned about the first six client-side security approaches. They all have benefits and limitations. Feel free ... Read More
What is the difference between client-side and server-side and why is it important to your everyday security?
For individuals not completely immersed in the world of IT and cybersecurity, it can be hard to keep up with the latest terms and acronyms. (Heck, sometimes it is even hard for the folks that are fully immersed in the world of IT and cybersecurity!) One set of terms appearing ... Read More
Everything You Need to Know About Code Obfuscators
Learn about JavaScript code scramblers and obfuscators. Discover how their use can support or limit code security. The post Everything You Need to Know About Code Obfuscators appeared first on Feroot ... Read More
How Synthetic Users Enhance Client-side Security
Building modern web apps requires a modern approach to security. Synthetic users allow us to fill that security gap while striking a balance between humans and bots. The post How Synthetic Users Enhance Client-side Security appeared first on Feroot ... Read More
Supply Chain Shock: Realities About the Security of the Software Supply Chain
News reports on attacks on the “supply chain” are becoming an almost every-day occurrence. First there was SolarWinds, then Kayesa, followed by countless other large and small supply chain attacks. Global businesses, economies, and lives are intricately connected to each other through applications and the internet. When critical systems are ... Read More
7 Ways Hackers Skim Data from Your Website While Flying Under the Radar
Pickpockets, scam artists, and thieves have been stealing money and information from people for thousands of years. Today, however, instead of having to learn sleight of hand to lift a wallet from someone’s pocket, cybercriminals have quickly adapted to the modern digital age by creating tools and code that easily ... Read More

OWASP Top 10 – What’s New in the 2021 Release
Learn about the OWASP Top 10 and what’s new in the 2021 release. Read about broken access control, cryptographic failures, XSS and more. The post OWASP Top 10 - What’s New in the 2021 Release appeared first on Feroot ... Read More
10 Ways to Improve Your Website Security (and Keep Your Customers Safe at the Same Time!)
Yes. There really are 10 fairly easy ways to improve your website security and protect your customers at the same time. But first, you may be asking “Why do I need to worry about my website security? Aren’t web applications safe? What could possibly go wrong?” We’re not in the ... Read More
Clash of the Titans: Marketing and Security
There’s a natural tension within most companies: marketing wants to get stuff out, while IT and security are focused on protecting the business. These waters between marketing and security can be treacherous, and a recent challenge we observed in a large U.S.-based northeastern bank, illustrates the issue well. Like many ... Read More