StrongBox IT

  • Home
  • Author: StrongBox IT
  • Page 11
strongboxit

Web Application Firewalls (WAF) and its Advantages

With the accelerated rise in the number of companies adopting cloud for running business applications and saving private data, cyber criminals have started to target web applications and websites. This has led to an ever-increasing need for web application Firewalls. According to an IBM report, the average cost of a data breach to enterprises is […]
Read More
strongboxit

Installing Modshield SB from the Azure Marketplace

Step 1:Select your preferred plan (either Cloud or BYOL) from the provided dropdown menu, and click Continue button Step 2: Click on Create button to configure various deployment settings <Step 3: Provide name for your new instance and change size if required from the available list Step 4: Configure your login username and authentication method in the […]
Read More
strongboxit

How an application firewall like Modshield SB could have saved the day

Freepik, a top-100 Alexa ranked popular website that provides access to free stock photos and design graphics, announced on Friday (21 August) that it had been subject to a major data breach due to a SQL injection vulnerability. In a statement released by the company, it is said that they immediately notified authorities of the […]
Read More
strongboxit

Installing Modshield SB from the AWS Marketplace

Step No: 1 Visit the marketplace page of the version that better suits your needs (Cloud / BYOL). Click on “Continue to Subscribe” button Step No: 2 Read and confirm that you accept the End User Licence Agreement (EULA) Step No: 3 You should see the status as “Pending” for a while when AWS processes your request, which should […]
Read More
strongboxit

Protection against API Credential Stuffing using Modshield SB Web Application Firewall

Ref: https://owasp.org/www-community/attacks/Credential_stuffing Credential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. This is a subset of the brute force attack category: large numbers of spilled credentials are automatically entered into websites until they are potentially matched to an existing account, which the attacker can then […]
Read More
Cart

No products in the cart.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare