On Friday April 12, Palo Alto disclosed that some versions of PAN-OS are not only vulnerable to remote code execution, but that the vulnerability has been actively exploited to install backdoors on Palo Alto firewalls. A patch is expected to be available on April 14th. The advisory from Palo Alto is here. The CISA advisory is here. Palo Alto has marked this vulnerability as critical and NVD has scored it a 10.0 with CVSSv3. Wallarm currently…
APIs (Application Programming Interfaces) have proliferated widely, which increases their susceptibility to various vulnerabilities. In the realm of web applications,…
Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community,…
All industries are at risk of credential stuffing and account takeover (ATO) attacks. However, some industries are at a greater…
Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies…
Government bodies are clamping down heavily on institutions and organizations that handle sensitive customer data. For APIs, tokens are used…
Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated,…
In our Annual API ThreatStats report, we highlighted the increasing threat of API Leaks. An API Leak is the disclosure…
Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be addressed with urgency. An alarmingly large segment…