Blog, Reflectiz Blog
Reflectiz | JavaScript Security in 2023: The Complete Guide to Stay Secure
Originally published by Reflectiz. In an era of expanding cyber threats, shadow code poses a significant risk to organizations’ cybersecurity. This hidden malicious code, often undetected by traditional security measures, operates within legitimate websites and web applications, undermining security from within.
Read MoreBlog, Reflectiz Blog
Reflectiz | How to Secure Your Website Against Shadow Code Threats
Originally published by Reflectiz. In an era of expanding cyber threats, shadow code poses a significant risk to organizations’ cybersecurity. This hidden malicious code, often undetected by traditional security measures, operates within legitimate websites and web applications, undermining security from within.
Read MoreBlog, Reflectiz Blog
Reflectiz Wins Top InfoSec Innovator Award for 2023!
Originally published by Reflectiz. We are delighted to share that our long term valued partner, Reflectiz, has been honored as a Top InfoSec Innovator Winner at the prestigious 11th Cyber Defense Magazine’s Annual InfoSec Awards during CyberDefenseCon 2023!
Read MoreBlog, Reflectiz Blog
Reflectiz | Exposure Management: Proven Strategies and Best Practices
Originally published by Reflectiz. Learn the essential best practices for sustaining a robust exposure management strategy, which is crucial in the face of sophisticated security threats.
Read MoreBlog, Reflectiz Blog
Reflectiz | C2 Server: The Brain of Client-Side Attacks Exposed
Originally published by Reflectiz. Take a deep dive into the realm of C2 servers, exploring their functions, the tactics employed by cybercriminals, and the urgent need for robust cybersecurity defenses.
Read MoreBlog, Magecart & Web-Skimming, Reflectiz Blog
Unmasking the Latest Magecart Attacks on Shopify: Exclusive Interview with Ysrael Gurt, Co-Founder and CTO of Reflectiz
Originally published by Reflectiz. In this exclusive interview, Reflectiz delves into their meticulous investigation and response to a series of advanced Magecart attacks that have shaken the e-commerce realm worldwide. These relentless attacks have cast a spotlight on the vulnerability of e-commerce platforms, sparking concerns across industries. The interview unveils invaluable insights into the dynamic strategies the elusive Magecart threat actors adopted.
Read MoreBlog, Reflectiz Blog
Reflectiz | reCAPTCHA Privacy — Is it an Oxymoron Now?
Originally published by Reflectiz. Google’s reCAPTCHA, widely used on over 15 million websites, faces privacy concerns as the French privacy commission CNIL finds it using excessive personal data beyond security purposes. CNIL discovered this while investigating an e-scooter company, Cityscoot, that used reCAPTCHA without obtaining user consent or providing information about data usage.
Read MoreBlog, Reflectiz Blog
Reflectiz | Web Exposure Management: Strengthening Security in the Modern Attack Surface
Originally published by Reflectiz. In the era of increasing web complexity, websites face growing threats like Magecart, supply chain attacks, misconfigurations, and data leaks. With Reflectiz, businesses can take charge of their web exposure and safeguard their digital presence against evolving cyber risks in today’s threat landscape.
Read MoreBlog, Magecart & Web-Skimming, Reflectiz Blog
New Magecart Attack Wears Google Tag Manager Disguise | Reflectiz
Originally published by Reflectiz. Magecart attacks have become increasingly common in recent years, with cybercriminals using cunning techniques to steal sensitive data from their unsuspecting victims. One of the latest tricks is to disguise their attacks as Google Tag Manager. Let’s examine this new attack method.
Read MoreAttack Surface, Blog, Reflectiz Blog, Third-Party Risk
Open Source Software Risks: How to Identify and Remediate Vulnerabilities | Reflectiz
Originally published by Reflectiz. Reflectiz will explore the nature of open source vulnerabilities, the risks they pose, and how organizations can detect and mitigate these vulnerabilities to enhance their security posture.
Read MoreBlog, Privacy, Reflectiz Blog, Security Compliance
5 Best Practices for Healthcare CISOs to Secure PHI | Reflectiz
Originally published by Reflectiz. The healthcare industry has increasingly come under attack by cybercriminals in recent years. Maintaining secure PHI has to be at the top of every healthcare CISO’s to-do list.
Read MoreAttack Surface, Blog, Reflectiz Blog, Third-Party Risk
What is CTEM? A Complete Overview | Reflectiz
Originally published by Reflectiz. Gartner coined the term Continuous Threat Exposure Management (CTEM). “By 2026, organizations prioritizing their security investments based on a continuous exposure management program will be three times less likely to suffer from a breach,” implying that those that don’t will be at considerably greater risk.
Read MoreBlog, Client-side Protection, Magecart & Web-Skimming, Reflectiz Blog
7 Required Steps to Secure Your iFrames Security | Reflectiz
Originally published by Reflectiz. iFrames carry several security risks that could let in attackers without the proper security steps. Today’s developers must ensure both the content used in iFrame and the iFrame configuration follow security guidelines to avoid opening vulnerabilities.
Read MoreAttack Surface, Blog, Reflectiz Blog, Third-Party Risk
5 Unexpected Ways to Reduce Your Attack Surface | Reflectiz
Originally published by Reflectiz. There are many actionable strategies to reduce your attack surface and make it more manageable. This article shares five additional ways to reduce your attack surface.
Read MoreAttack Surface, Blog, Reflectiz Blog, Software Assurance
6 Essentials for Foolproof Source Code Security | Reflectiz
Originally published by Reflectiz. To prevent the consequences of weak source code, foolproof source code security is the goal, and here are six essential steps that can help you achieve it.
Read MoreReflectiz Blog, Resource
The Complete Buyer’s Guide: Client Side Web App Security | Reflectiz
During Black Friday 2021, 88 million Americans spent $8.9 billion online, with the average adult spending $430, so it’s no wonder that cybercriminals have marked this eCommerce bonanza on their calendars too. But there’s still time to prepare for the Black Friday web threats like web skimming & Magecart attacks, supply chain attacks, a man in the middle attacks, and more.
Read MoreBlog, Reflectiz Blog
The Two and a Half Years See Tickets Web-Skimming Attack Didn’t Need to Happen! | Reflectiz
Originally published by Reflectiz. All online retailers are like honeypots to cyber criminals, and ticket retailers are no exception. The See Tickets web skimming attack is a sobering example of what can happen when companies don’t make their supply chain security watertight.
Read MoreBlog, Reflectiz Blog
ECRI Warns Healthcare Providers About Third-Party Tags Like Meta Pixel | Reflectiz
Originally published by Reflectiz. About a third of the top US hospitals are found to be sending sensitive data and PII to Facebook. Reflectiz investigates as the story unfolds.
Read MoreBlog, Reflectiz Blog
What Can We Learn from the Famous Macy’s Magecart Cyberattack? | Reflectiz
Originally published by Reflectiz. The Macy’s Magecart attack was the first to use malicious code customized to target a single website, skim credit card details from shoppers’ wallets, and personal identifying information.
Read MoreBlog, Reflectiz Blog
What is Software Security Assurance and Why You Should Care | Reflectiz
Originally published by Reflectiz. Weak software security can bring critical business services offline or lead to stolen sensitive data. One of your most essential tasks in today’s software-driven world is ensuring your business uses secure software. Read on to learn what software security assurance is and why you should care.
Read More