PCI DSS v4.0 is Coming: Here’s How to Achieve Compliance

PCI DSS v4.0 is Coming: Here’s How to Achieve Compliance

Learn how PCI DSS v4.0 will impact your business and what you can do to achieve compliance ...
A Cure for the Obscure: JavaScript Deobfuscation

A Cure for the Obscure: JavaScript Deobfuscation

PerimeterX and HUMAN have released a new open source JavaScript deobfuscation tool called REstringer. It is also available as an online tool ...
5 Risks of Client-side Supply Chain Code

5 Risks of Client-side Supply Chain Code

If a cybercriminal conducts a successful supply chain attack against your site, the consequences for the business can be severe ...
Managing the Risks of Third-party Code in the Digital Supply Chain

Managing the Risks of Third-party Code in the Digital Supply Chain

The risks of third-party code can leave website owners blind to security vulnerabilities that cybercriminals can exploit in client-side supply chain attacks ...
6 Lessons Learned from the Segway Magecart Attack

6 Lessons Learned from the Segway Magecart Attack

Segway, the motorized scooter manufacturer, fell victim to a Magecart attack in early January 2022. Here are six lessons learned ...
Client-side Supply Chain

How to Mitigate Client-side Supply Chain Threats

Using client-side code from third-party libraries can put you at risk of a supply chain attack. Learn how to mitigate client-side threats ...
Client side battle against javascript attacks

The Client-Side Battle Against JavaScript Attacks Is Already Here

Learn about client side data protection and Javascript security methods used by hackers like DOM Modification, Browser Storage Data Access, & Data Harvesting ...
Client-Side - The Security Blindspot of your Website

Client-Side – The Security Blindspot of your Website

We’ll describe how a few of the more notable changes (Javascript and client side development) have led web application operators into a challenging situation ...
CPRA Noncompliance

Do Your Third-Party Vendors Put You At Risk For CPRA Noncompliance?

PerimeterX CTO and co-founder Ido Safruti explains how third-party code puts you at risk for CPRA noncompliance ...
Online Skimming & Digital Skimming Attacks

All About Online Skimming or Digital Skimming Attacks

The post explains the evolution of skimming attacks, how does it work, examples of skimming attacks, trends and how to protect against skimming in detail ...