Blog, Reflectiz Blog
40% of Australians Have Had Personal Data Stolen in the Optus Massive Data Breach | Reflectiz
Originally published by Reflectiz. The Macy’s Magecart attack was the first to use malicious code customized to target a single website, skim credit card details from shoppers’ wallets, and personal identifying information.
Read MoreBlog, Reflectiz Blog
Top 5 Most Common Web Threats for Black Friday 2022 | Reflectiz
Originally published by Reflectiz. During Black Friday 2021, 88 million Americans spent $8.9 billion online, with the average adult spending $430, so it’s no wonder that cybercriminals have marked this eCommerce bonanza on their calendars too. But there’s still time to prepare for the Black Friday web threats like web skimming & Magecart attacks, supply chain attacks, a man in the middle attacks, and more.
Read MoreBlog, Reflectiz Blog
Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
Originally published by Reflectiz. Much of the effort to secure APIs should concentrate on the most common vulnerabilities that consistently lead to breaches, stolen data, and other adverse outcomes, including financial costs to your business. Let’s look at the top five API vulnerabilities, their implications, real-world examples, and mitigation tips.
Read MoreBlog, Reflectiz Blog
The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
Originally published by Reflectiz. The recently exposed SolarWinds supply chain attack is one of the biggest cybersecurity events in recent memory. It created a ripple effect that will be felt for years to come on a global scale. Third-party security will never be the same again after this mega-breach, which affected some of the biggest Fortune 500 companies and US government entities. Let’s dive into the details.
Read MoreBlog, Reflectiz Blog
The Essential Guide to Preventing JavaScript Injection | Reflectiz
Originally published by Reflectiz. Third-party vendors who access your sites may inadvertently open doors to cybercriminals. When choosing a security platform, platforms such as Reflectiz can help cover for vulnerabilities created by outside vendors through real-time monitoring, creating an app inventory, and more. Of course, your own site’s security is no less critical. Here are some of the practices you can implement to ensure it remains secure.
Read MoreBlog, Reflectiz Blog
A Step-by-step Guide to Preventing Formjacking Attacks | Reflectiz
Originally published by Reflectiz. Here are some actionable, recommended steps your business can take to protect against the threat of formjacking attacks.
Read MoreBlog, Reflectiz Blog
PCI-DSS Got an Update – What Does Version 4.0 Mean for Your Compliance Requirements? | Reflectiz
Originally published by Reflectiz. PCI-DSS is going through some changes! The Payment Card Industry standards are one of the most important compliance regulations for any business that takes online payments, and it’s been 4 long years since the last update.
Read MoreBlog, Reflectiz Blog
Why WAF and Firewall Solutions Will Not Help Against Third-Party Website Attacks | Reflectiz
Originally published by Reflectiz. This article will walk you through the limitations of what a WAF or a perimeter firewall can achieve, and why it’s not enough to handle today’s threat landscape.
Read MoreBlog, Reflectiz Blog
8 Best Content Security Policies for 2022 | Reflectiz
Originally published by Reflectiz. Content Security Policies can vary, and what makes one policy better than another can depend on your site’s specific needs. Reflectiz collected top eight recommendations for 2022 for you to pick and choose what may work best with your existing CSP, your other cybersecurity policies.
Read MoreBlog, Reflectiz Blog
Infiltrating Internal Networks with Log4Shell | Reflectiz
Reflectiz begins to grasp the scope of events that followed the discovery of CVE-2021-44228, also known as ‘Log4Shell’, and its impact on the information security world.
Read MoreBlog, Reflectiz Blog
The Log4J Vulnerability in Bing Domain | Reflectiz
Reflectiz platform detected a Log4J vulnerability in a domain owned by Microsoft. The Bing domain is now patched and secure, but what about the others?
Read MoreBlog, Reflectiz Blog
Scanning for the Log4J In Your Digital Vendors | Reflectiz
Reports published on the 9 December 2021 have it that information security researchers discovered a critical security vulnerability in the logging library log4j. The discovery turned the cybersecurity world into turmoil, indicating a supply chain vulnerability that compromised the world’s biggest applications, cloud services, and other software services.
Read MoreOffer, Reflectiz Blog
Reflectiz Security Essentials Package
Reflectiz Security Essentials package for up to 10 sites, Special Prices annually for a single site! Offer valid for limited time only.
LOGON Software Asia and Reflectiz, the global leader of Digital Security for Websites, join forces to bring you the best SaaS solution of Web-Apps Client-Side Security Protection for your websites.
Notifications, Reflectiz Blog
The CDNjs’ Remote Control Execution | Reflectiz
Imagine that you’re a threat actor. You’re looking for a vulnerability to exploit night and day, turning every stone in your path until you discover a bot that lets you implement arbitrary code by automatically updating OS Repositories hosted on the largest CDN in the world.
Read MoreNotifications, Reflectiz Blog
Why You Need a Digital Inventory | Reflectiz
Whether monetizing, analytics, or even customer interaction, these website digital applications are integral to your website’s supply chain, as developers don’t write all of their code by themselves. They integrate external scripts and frameworks into the existing website’s code. Orginally published by Reflectiz.
Read MoreBlog, Reflectiz Blog
Prepare Your Online Store for the Holidays | Reflectiz
In recent years, client-side attacks gained popularity among threat actors. While most info-security systems today focus on the classical OWASP top 10 security threats, they protect the server while exposing the client-side attack surface.
Read MoreNotifications, Reflectiz Blog
Reflectiz Officially Receives ISO 27001 Certification
Reflectiz is now officially ISO/IEC 27001:2013 certified. This essentially means that the company is meeting one of the strictest Information Security Management requirements in the industry today. Originally published by Reflectiz.
Read MoreBlog, Reflectiz Blog
Digital Security in the Travel and Tourism Industry | Reflectiz
The travel and tourism industry was reaching peak digitalization levels before COVID-19 struck in early 2020. The cybersecurity implication is simple – more travel and tourism targets for hackers and malicious entities. Let’s learn more about the risks involved and how to mitigate them.
Read MoreBlog, Reflectiz Blog
India Privacy and Data Protection Bill | Reflectiz
To manage eCommerce websites and eService platforms at this current day, you have to make sure that personal data and information is secure at all times to stay compliant, regardless of where they are operating.
Read MoreBlog, Reflectiz Blog
New Feature: An Advanced Tool for Domain Security for your Website | Reflectiz
The new and advanced Domain Security feature from Reflectiz allows you to scan your website ecosystem on an ongoing basis to eliminate all redundant remote domain dependencies and to detect internal domains that may be unsafe.
Read More