Please turn on your JavaScript for this page to function normally.
ecommerce
Attackers take over expired domain to deliver web skimming scripts

Attackers have taken over at least one expired domain that used to host a popular JavaScript library and used it to deliver web skimming scripts to a number of e-commerce …

lock
The ripple effect: Why protection against supply chain attacks is a must

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …

Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets

Jscrambler announced it has raised $15 million in Series A financing for website and mobile app security to rewrite the rules of website security. The round was led by Ace …

bot protection
How do I select a bot protection solution for my business?

A recent research revealed that 25% of internet traffic consists of bots, meaning almost every human interacting online has its bot equivalent. Bots are generally used to …

network
Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …

secure
Protect your organization in the age of Magecart

The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a …

shark
Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

Jscrambler launches Self-Healing JavaScript to prevent code tempering

Jscrambler, a technology company specializing in JavaScript Application Security and Web Page Monitoring solutions announces Self-Healing JavaScript – a world first for …

building
Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical …

Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications

Intertrust Technologies and Jscrambler announced a jointly-sourced product suite App Shield 360 that provides a set of application shielding solutions for both native and …

Don't miss

Cybersecurity news