Phobos ransomware CISA

IBM: Cost of a Data Breach Hits Another High

The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to ...
Security Boulevard
XSS Malicious Request that exploit CVE-2023-30777

Over 2 million Websites Vulnerable to XSS Exploit (CVE-2023-30777) in WordPress Plugin

A zero-day vulnerability, denoted by the CVE identifier CVE-2023-30777, exposes a dangerous reflected cross-site scripting (XSS) flaw The post Over 2 million Websites Vulnerable to XSS Exploit (CVE-2023-30777) in WordPress Plugin appeared ...
Broken access control

35 Most Notorious Hacks in History that Fall Under OWASP Top 10

What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of them, which would be strong candidates for the title. The post 35 Most Notorious ...
AppTrana WAAP

Web Browser-Based Attacks – Types, Examples, and Prevention

A web browser attack targets vulnerabilities in web browsers to compromise user data. These attacks often involve injecting malicious code into web pages. The post Web Browser-Based Attacks – Types, Examples, and ...
Black Basta Ransomware 1

New Black Basta Ransomware Attack Brings Down 50 Organizations Globally

As hackers found more and more ways to exploit information security loopholes, they started using a new strain of ransomware called “Black Basta” ransomware virus. While the linkages are yet. The post ...
Customer Feedback

1.5 Million Customers Impacted By US Bank Data Breach – Possible Lessons Learned

Cybercriminals pick their targets based on two main motives – maximum profit and maximum impact. With the highest penetration rates for digital banking and the increased adoption of digital transformation,. The post ...
Top Ways Modern Malware Defeats Your Defense and What You Can Do About It

Top Ways Modern Malware Defeats Your Defense and What You Can Do About It

Modern malware is more tenacious than you’ve perhaps been led to believe. You may have security software and a cutting-edge anti-malware solution to protect you from possible attacks. Unfortunately, modern. The post ...
Best Application Security Service Provider

15 Malware Statistics to Take Seriously in 2022

Malware and its many types – Trojans, spyware, viruses, and so on – are persistent threats that can wreak havoc on the affected systems and the entire business. The malware. The post ...
web application security banner

Tips to Prepare for an Effective Phishing Attack Simulation

94% of malware comes via email and 32% of security breaches in 2019 included phishing, according to statistics, and while there has been a big improvement in the way SMEs. The post ...
web application security banner

How to Prevent Bot-Driven SQL Injection Attacks?

One of the most common attack types, SQL Injection attacks (SQLi attacks) have far-reaching business impacts. A successful injection attack of this kind could lead to exposure of sensitive information,. The post ...