Application Attacks

Top 4 Application Attacks Detected and Blocked by Contrast ADR | XSS, Method Tampering, Path Traversal and JNDI Injection | Contrast Security
The Contrast Security Runtime Security Platform — the engine that underpins Contrast’s Application Detection and Response (ADR) technology — blocked approximately 47K cybersecurity attacks during the month of August 2024. ...

Award Finalist: Contrast Security Application Detection and Response
Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award. ...

Award Finalist: Contrast Security Application Detection and Response
Less than a month after we at Contrast Security announced Application Detection and Response (ADR), it is already a finalist for a major cybersecurity award. ...

Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security
One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...

How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security
One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...

ADR Security Technology for AppSec Vulnerabilities | Contrast Security
On Aug. 6, Contrast Security introduced a new security technology we call Application Detection and Response (ADR). ADR seeks to fill a critical gap in Application Security (AppSec) that leaves the application ...

What is an island hopping cybersecurity attack? | Cyber Bank Heists Report | Contrast Security
Cyber Bank Heists report sheds light on the evolution of island-hopping cyber threats This year’sCyber Bank Heists report by Contrast Security was eye-opening. The annual report sheds light on the cybersecurity threats ...
Q1 2022 DDoS and Application Attack Activity: An Overview
The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors dominated the DDoS threat landscape while application security faced tried-and-true ...

When You Get Breached, So Do Your Customers
No industry is immune to emerging attack vectors. Here are some of the primary attack types that are targeting SaaS providers. The post When You Get Breached, So Do Your Customers appeared ...

How to Prepare for Cyber Threats Targeting the Olympics
While connectivity provides a better user experience, additional technology and innovation can create a larger attack surface for cybercriminals. The post How to Prepare for Cyber Threats Targeting the Olympics appeared first ...