Protect your applications from brute force attacks

Protect your applications from brute force attacks

For cybercrime, private accounts protected by authentication keys are valuable sources of information. Email services, banking applications, e-commerce portals and social networks, for example, gain attention from attackers based on information that can be exploited...
What is Cross-site Scripting (XSS)?

What is Cross-site Scripting (XSS)?

Cross-site Scripting (XSS) is a type attack that injects malicious code in web applications, ranked among the top vulnerabilities in OWASP Top 10 2017. For example, an attacker takes advantage of a given vulnerability on a website trusted by their visitors to install...
Put up your defenses against botnets

Put up your defenses against botnets

What is a Botnet? Botnets are networks of devices with data processing capability, controlled by malicious individuals or groups to promote unwanted or cybercriminal activities. In general, botnets integrate thousands of contaminated devices, which promote malicious...
Build barriers against DNS attacks

Build barriers against DNS attacks

DNS (Domain Name System) servers make it easier to browse the internet every day because they translate nominal addresses (ex.: websites) into IP addresses, which are much simpler for most users to remember. Picture having to save 15 different numeric combinations to...