Attackers take over expired domain to deliver web skimming scripts

Attackers have taken over at least one expired domain that used to host a popular JavaScript library and used it to deliver web skimming scripts to a number of e-commerce sites. “The victim websites had years to remove the dead link that was leve… Continue reading Attackers take over expired domain to deliver web skimming scripts

The ripple effect: Why protection against supply chain attacks is a must

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its fallout proved to be massive – starting with national (US) security con… Continue reading The ripple effect: Why protection against supply chain attacks is a must

Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets

Jscrambler announced it has raised $15 million in Series A financing for website and mobile app security to rewrite the rules of website security. The round was led by Ace Capital Partners, with the participation of existing investors including Portuga… Continue reading Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets

How do I select a bot protection solution for my business?

A recent research revealed that 25% of internet traffic consists of bots, meaning almost every human interacting online has its bot equivalent. Bots are generally used to automate simple and repetitive tasks, but can also be used to exploit vulnerabili… Continue reading How do I select a bot protection solution for my business?

Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc earlier this month – in a nutshell, they showed how the Spectre vulnerabi… Continue reading Using memory encryption in web applications to help reduce the risk of Spectre attacks

Protect your organization in the age of Magecart

The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a security point of view. It all really boils down to timing. If the e-commerce … Continue reading Protect your organization in the age of Magecart

Code Protection Leaders Join Forces to Arm App Developers with Cutting-Edge Countermeasures Against Ever-Evolving Cyberattacks

Verimatrix partners with Jscrambler, combining industry-leading JavaScript protection with Verimatrix’s easily-deployed application shielding solutions Aix-en-Provence, France and San Diego, USA, May 12, 2020 – Verimatrix, (Euronext Paris: VMX), today … Continue reading Code Protection Leaders Join Forces to Arm App Developers with Cutting-Edge Countermeasures Against Ever-Evolving Cyberattacks

Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a real security threat – and one which the enterprise is vastly unprepar… Continue reading Is the enterprise on the brink of a global web supply chain attack?

Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical cyber attacks, supply chain attacks provide two major advantages to attackers. F… Continue reading Supply chain attacks: Mitigation and protection