ImmuniWeb Security Blog | Page 24
Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment.
Cybersquatting, typosquatting and phishing now target the largest cybersecurity brands.
Existing and new web security technologies based on actively developed RFCs propose new approaches to common web vulnerabilities remediation.
MIT project confirms that neither human nor machine has proven overwhelmingly successful at maintaining cybersecurity on their own.
Cybersecurity is not something you can just buy, but something you should thoroughly build.
Cybersecurity compliance is not designed to eliminate data breaches or stop cybercrime.
Can a Web Application Firewall be an efficient security control for modern web applications?
Have you ever thought how secure and reliable your SSL VPN? Probably you should.
Five simple RFP rules to get the best price/quality ratio when buying cybersecurity products and services.
Gmail users will now be able to see if a remote SMTP server has TLS encryption enabled.
In this blog post we will demonstrate complicated examples of common web application vulnerabilities, and see how they can be mitigated with ModSecurity WAF.
Bitrix24 is one of the first and most secure cross-platform corporate software with integrated WAF and RASP. Let's see how we can bypass them.