IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
This month we are sharing a blog from our security partner Radware that takes a look at recent attacks on the financial services industry.
Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the United States and Europe.more →
This month we are sharing a blog from our security partner Oracle + Dyn that takes a look at web application security and what lies ahead.
Websites and apps are increasingly under attack, so effective web application security must be a top priority.
Before 2008, data breaches were somewhat rare, and most occurred because of human error, such as the loss of a laptop, a USB drive, or some other media.more →
A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).more →
Global entertainment ticketing service Ticketmaster recently suffered a massive breach in security that resulted in nearly 40,000 customer credentials being taken over the course of a few months, from various countries including the UK. The case generated a lot of press, increasing the worries of the general public and leaving some customers looking for compensation.more →
Tut Tut! The Dixons Carphone group has been hit by another potentially devastating cyber attack. This time around, millions of credit card numbers and data records are involved. It couldn’t get much worse really.
Back in 2015 activereach was campaigning for businesses to get their heads out of the sand –more →
This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.more →
Web and mobile application cyber-attacks are on the increase, with Forrester reporting that 40% of all security breaches are aimed at these services. Even more worryingly, attacks specifically targeting secure Web services such as e-commerce are particularly on the rise, with Arbor Networks recently reporting “a massive increase over last year”.
It is not surprising that cybercriminals are targeting web-based applications.more →