Jscrambler
Attackers take over expired domain to deliver web skimming scripts
Attackers have taken over at least one expired domain that used to host a popular JavaScript library and used it to deliver web skimming scripts to a number of e-commerce …
The ripple effect: Why protection against supply chain attacks is a must
The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …
Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets
Jscrambler announced it has raised $15 million in Series A financing for website and mobile app security to rewrite the rules of website security. The round was led by Ace …
How do I select a bot protection solution for my business?
A recent research revealed that 25% of internet traffic consists of bots, meaning almost every human interacting online has its bot equivalent. Bots are generally used to …
Using memory encryption in web applications to help reduce the risk of Spectre attacks
There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …
Protect your organization in the age of Magecart
The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a …
Is the enterprise on the brink of a global web supply chain attack?
Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …
Jscrambler launches Self-Healing JavaScript to prevent code tempering
Jscrambler, a technology company specializing in JavaScript Application Security and Web Page Monitoring solutions announces Self-Healing JavaScript – a world first for …
Supply chain attacks: Mitigation and protection
In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical …
Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications
Intertrust Technologies and Jscrambler announced a jointly-sourced product suite App Shield 360 that provides a set of application shielding solutions for both native and …
Featured news
Sponsored
Don't miss
- Researchers unearth two previously unknown Linux backdoors
- AxoSyslog: Open-source scalable security data processor
- Product showcase: Augmenting penetration testing with Plainsea
- CWE top 25 most dangerous software weaknesses
- Enhancing visibility for better security in multi-cloud and hybrid environments