Web Apps
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...

Freebie Bots: The Latest Threat to Retailers this Holiday Season and Beyond
Special Thanks to Kasada Research and Threat Intelligence Team for their contributions and insights Introduction: What are Freebie Bots? Steep discounts drove Cyber Monday online sales to hit a record of $11.3 ...
Why I Joined Kasada: Redefining Application Security
Automated threats to websites, mobile apps, and APIs aren’t new at all. But that’s what makes the current state of Application Security and API Security so fascinating. The reality is these threats ...

Top 19 OWASP Automated Threats in eCommerce: Disrupt Them with Bot Mitigation
A Rise in Online Business Disruption from Automated Threats Where there is money, there is greed. And where there is greed, there is exploitation. Such is the case with the rapidly growing ...

Top 19 OWASP Automated Threats in eCommerce: Disrupt Them with Bot Mitigation
A Rise in Online Business Disruption from Automated Threats Where there is money, there is greed. And where there is greed, there is exploitation. Such is the case with the rapidly growing ...

Integration at the Heart of Everything
From the day we started building Tala, we’ve been motivated to not only build the best possible product for our customers, but also to make it incredibly easy to use. For us, ...

Upcoming Features of Subresource Integrity 2.x
As a response to the growing number breaches involving CDNs, the first release of the Subresource Integrity (SRI) was published hastily in late 2015. The W3C WebAppSec Working Group decided to leave ...

Scanning Websites for SRI Hash Usage with sritest.io
Third-party hosted website assets, such as JavaScript libraries, are vulnerable to tampering. However, a new technique named Subresource Integrity (SRI) is here to protect these external assets. One problem is the slow ...

Bypassing WordPress Login Pages with WPBiff
Two-factor authentication protected WordPress login pages can be bypassed because of certain unsafe NTP practices. The Internal clock of remote servers can be manipulated under the right conditions. Because certain WordPress Google ...

Tricking Google Authenticator TOTP with NTP
Because of unsafe NTP practices, internal clocks on remote machines can be manipulated under the right conditions. Once time is altered, expired SSL certificates become valid again and causes HSTS policies to ...