Application Detection and Response (ADR) Gives the SOC Deep Visibility into the Application Layer | Contrast Security

Application Detection and Response (ADR) Gives the SOC Deep Visibility into the Application Layer | Contrast Security

The life of a Security Operations Center (SOC) analyst is often compared to navigating a vast and dangerous ocean. While tools like Intrusion Detection Systems (IDS), Cloud-Native Application Protection Platforms (CNAPP), and ...
Figure 1 attacked industries

Imperva Protects Against the Exploited CVEs in the Cleo Data Theft Attacks

The Clop ransomware group has once again demonstrated its ability to exploit vulnerabilities to compromise sensitive systems. As Cleo—a managed file transfer provider for businesses—grapples with the aftermath of Clop’s targeted attack ...
Naming Conventions

Breaking the Chain of Data Access: The Importance of Separating Human and Application Users

Data, the lifeblood of any organization, relies on the database as its beating heart. As a result, businesses invest heavily in designing and monitoring all access to it. In traditional literature, there ...
Understanding Business Logic Abuse and Its Detection Challenges

Understanding Business Logic Abuse and Its Detection Challenges

Digital modernization and automation have been on a rapid trajectory for the last 5 years and were thrust forward at an even faster pace when the COVID-19 pandemic and subsequent lockdown period ...
CVE-2023-29552: Abusing the SLP Protocol to Launch Massive DDoS Amplification Attacks

CVE-2023-29552: Abusing the SLP Protocol to Launch Massive DDoS Amplification Attacks

On April 25, 2023, researchers at Bitsight and Curesec jointly discovered a high-severity vulnerability — tracked as CVE-2023-29552 — in the Service Location Protocol (SLP), a legacy Internet protocol. What is SLP ...

New Vulnerability in Popular Widget Shows Risks of Third-Party Code

The Americans with Disabilities Act (ADA) includes requirements on companies falling within its scope to ensure their websites are accessible to individuals with disabilities. These requirements have created a strong incentive for ...