Please turn on your JavaScript for this page to function normally.

web application security

Static analysis technology for web application security

Coverity has extended static analysis to deeply understand both source code and modern web application architecture, providing greater accuracy and remediation guidance to …

Create secure web applications with Sentinel Source

WhiteHat Security announced Sentinel Source, a solution for creating secure online applications from inception to launch. With the ability to track source code development for …

LogRhythm and Imperva partner on database and web application security

LogRhythm announced a partnership with Imperva. It includes technical integration that enables Imperva’s SecureSphere solution to feed data to LogRhythm’s SIEM 2.0 …

Guard your website against malicious activity with WebsiteDefender

Acunetix released WebsiteDefender, an online security monitoring service which helps you secure websites against malware and hacker activity. Google’s security blog …

Web Application Security, A Beginner’s Guide

Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …

Juniper Networks enhances its Mykonos Web Security software

Juniper Networks announced major platform enhancements to its Mykonos Web Security software. The new release provides 30 new features and enhancements that strengthen …

Kickstarter bug granted access to unlaunched projects

A bug in the private application programming interface (API) of Kickstarter, the popular crowd funding website for creative projects, has exposed details about 70,000 projects …

1,000+ WordPress sites compromised through automatic update feature

More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result …

Top 10 business logic attack vectors

Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …

Majority of web apps vulnerable to most frequent exploits

84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …

How to spot automated Web application attacks

Imperva released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. As much as 98 percent of …

Web application attack report from FireHost

Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools