Welcome back to Jscrambler 101! A collection of tutorials on how to use Jscrambler to protect your JavaScript. This tutorial covers Jscrambler version 7.1.
Introduction
Last time, on Jscram… Read More
Cyber attacks have already been making some significant headlines in 2021. Organizations are facing increasingly complex challenges, especially when it comes to Web security.Follwing the ex… Read More
Leading Neobanks like Revolut, Nubank, Starling Bank, and many others keep challenging the banking industry and setting new standards — but all these Neobanks have their own challenge… Read More
If you are a cybersecurity aficionado you have likely heard of the Magecart cybercriminal groups. Very active since 2018, they are known for injecting web credit card skimmers on e-commerce… Read More
Welcome back to Jscrambler 101! A collection of tutorials on how to use Jscrambler to protect your JavaScript. This tutorial covers Jscrambler version 7.2.
Introduction
Last time, on Jscram… Read More
Next.js is an open-source React-based framework built on top of Node.js that is aimed at developing web apps. It includes handy features such as hybrid static & server rendering, TypeSc… Read More
Development teams are building, testing, and shipping code faster than ever before. Today, we know that security has a role to play at the early stages of the DevOps workflow, but these sec… Read More
Gartner, the world's leading research and advisory company, has recognized Jscrambler as a Sample Vendor in the Hype Cycle for Application Security 2021.
Jscrambler's code integrity enables… Read More
We are thrilled to announce that Jscrambler has just raised $15 million in Series A financing, in a round led by Ace Capital Partners and with participation from existing investors Sonae IM… Read More
What is intellectual property theft?
Intellectual property theft (also called IP theft) refers to someone illegitimately taking possession of someone else’s proprietary inventions or… Read More
Nowadays, strict GDPR laws and regulations make it imperative for web applications to be as safe as possible. Not only from a legal point of view but also from a business perspective, it is… Read More
What are Magecart web skimming attacks?
Magecart is a collective name given to cybercriminals who inject digital credit card skimmers (or web skimmers) into e-commerce and payment websites… Read More
Introduction to Obfuscate Javascript
The Javascript Obfuscator is one of the free tools, and it’s also open-source. Obfuscate is used for hiding the business logics from outside of th… Read More
In the era of digitalization, there’s no doubt the online world has become a central piece of the average person’s life. From healthcare to financial services, we see new player… Read More
Over the last couple of years, we have witnessed the acceleration of the shift towards digitalization due to the COVID-19 pandemic. And with each new year, come new trends in the software d… Read More
Infinite Scrolling is a way to implement pagination in mobile devices. It is common among mobile interfaces due to the limited amount of space. If you use social media applications like Ins… Read More
Quick Summary:
Although not visible to the human eye, React security vulnerabilities can be deadly to your web application. JavaScript has a lengthy history of being related to common secur… Read More
The ongoing digital acceleration has brought on a lot of new challenges to companies, as technology changes rapidly and plays a bigger role across a myriad of sectors. But what does this sh… Read More
In this blog post, we explore how organizations can use public threat intelligence frameworks like Alienvault OTX, MITRE, and others alike, to enrich data into actionable intel to thwart fu… Read More
Storage means a space for putting things for future use. From a web application perspective, storage can be broadly classified into two types: server-side storage and client-side storage. S… Read More
Phishing attacks are a form of social engineering attacks and are responsible for more than 80% of the reported security incidents.In this blog post, we are going to talk about the browser i… Read More
About a month ago, we came across a report about the discovery of another magecart infection. Even though this infection was first detected in a known consumer electronics retailer, the sam… Read More
In recent years, we have seen the technologies used for creating web products develop rapidly, and JavaScript became the predominant language of the Web. In fact, JavaScript is part of 97%… Read More
In this blog post, we explore how there is a rise in bots attacking organizations using credential stuffing attacks and why there is a need to understand them for better and more secure mit… Read More
Are you a gamer? Are you a child of the 80s and 90s? If the answer to these two questions is yes, this might be the best post you see today. Those classic games you played in the arcade wit… Read More
When you have a complex mobile application structure or many screens in your application, handling navigation can become tricky. However, with open-source libraries like React Navigation, t… Read More
Introduction
We introduced MITRE ATT&CK in our previous blog post where we explored threat intelligence. In this post, we’ll take a look at every aspect of MITRE ATT&CK in deta… Read More
E-commerce skimming, also known as form-jacking or Magecart attacks, represents the majority of criminal attacks against payment card data. They are simple to do and are hidden from the mer… Read More
Cross-site scripting is a vulnerability that happens when there’s an injection of malicious code to run on a regular webpage. This piece of code can go on to cause unauthorized actions… Read More
In this post, we will address the role of OWASP’s MASVS-R, the Mobile Application Security Verification Standard, the application standard for mobile applications security, and how we… Read More
Each year, Gartner creates more than 100 Hype Cycles across various domains to help clients track the maturity and future potential of innovations. The Hype Cycle for Application Security… Read More
Listed among Sample Vendors in the Web App Client-Side Protection category
Jscrambler, a leader in client-side web security, today announced its inclusion in the Gartner Hype Cycle for Ap… Read More
Data is one of the essences of any application. For a web app to be functional it requires the data to flow from one part of the application to another. From a React or Angular application'… Read More
One of VueJS's features is functional components, which is another option for how we can write our components. It allows us to design stateless components quickly. If you are a developer wh… Read More
In this blog post, let's learn about the lesser known vulnerability known as HTTP Parameter Pollution or HPP, which affects multiple modern applications. We will go over what's the reasons… Read More
It has been almost twelve years since I first attended an OWASP event, the OWASP Summit 2011 in Portugal, and it was memorable. Unlike conferences, which are more formal, the purpose of the… Read More
Authors: Pedro Fortuna, Pedro Marrucho, David AlvesIn the last few years, we’ve seen Magecart or Web Skimming Attacks become common. They operate in campaigns, trying to hit as many t… Read More
Updated on 2022-12-07
A newly spotted web skimming campaign, active since at least 2021, has infected 40 e-commerce sites. The threat actor, Group X, leveraged a unique supply-chain techniqu… Read More
APT5: Citrix ADC Threat Hunting Guidance
(published: December 13, 2022)
Background:
On December 13, 2022, the US National Security Agency published a report on the ongoing exploitation of Ci… Read More
10 IT certifications paying the highest premiums today The Certified in the Governance of Enterprise IT (CGEIT) certification is offered by the ISACA to validate your ability… Read More
As a Vue developer, you've probably heard of the terms Vuex and Vue.observable; both are used to control the state of your application, but one is rather lengthy and tough for a newbie to g… Read More
Several web applications have been booming in recent years, as every organization prefers it for business due to its easy maintenance and advanced features. And it’s evident that when… Read More
Millions of people shop online every day using payment cards. The move to e-commerce was accelerated by the pandemic, particularly in companies and areas where an online transactional presen… Read More
New Jersey, United States,- The Vulnerability Management Software report presents information related to restraints, key drivers, and opportunities, along with a detailed global market… Read More
Unit testing is an important phase of software development. It helps in adding new enhancements without breaking the existing application features. There are a number of tools and frameworks… Read More
“I don’t have full control and visibility of third-party scripts on my website.”That is the most common concern we heard from security and risk professionals at PCI London… Read More
Service workers are JavaScript workers that run in the background of a web page, act as a proxy between the web browser and the server, and can be used to manipulate the DOM (Document Object… Read More
E-commerce websites are at constant risk of data skimming attacks because of unprotected JavaScript that runs on the payment page. More than 99% of all websites use JavaScript in some form… Read More
In this tutorial, you'll learn the basics of how to route pages in your Next.js application. Throughout the course of this tutorial, I'll try to explain the different types of routing availa… Read More
PCI DSS 4.0 contains two new requirements designed to protect against (requirement 6.4.3) and detect (requirement 11.6.1) e-commerce skimming attacks. These two new requirements are a best p… Read More
The Payment Card Industry (PCI) Data Security Standard (DSS) is a well-known general data security standard that is applicable to all organizations that store, process, or transmit payment c… Read More
Jscrambler has joined the PCI Security Standards Council (PCI SSC) as a new Principal Participating Organization. Jscrambler will help drive the future of global payment security with a stra… Read More
A kanban board is a management tool that tracks and manages the team's activity in an organization or personal projects. It has a sequence of columns with different tracking categories or ac… Read More
Server-side rendering (SSR) is the technique of generating the page on the server side and then once it's ready, sending it over to the client side to hydrate. SSR is also good from a searc… Read More
Integrating Jscrambler with GitHub will make it easier for users to include Jscrambler’s Code Integrity protection in their build pipeline.
The users have the action ready on the GitHu… Read More
Testing our entire application to identify bugs, website performance, and poor UI/UX functionalities is essential. End-to-End testing can assist in solving all of these issues as it involves… Read More
For another year, RSAC brought together thousands of cybersecurity professionals for four days of expert perspectives, groundbreaking innovation, and best practices.For some of our team memb… Read More
Posted on Jul 18 There are many useful JavaScript obfuscation and encryption tools available in the market. Some of the popular and widely used tools include:UglifyJS (Roman… Read More
It is crucial to gain insights about all the cost-related factors before developing iOS mobile application. Although, iOS app development cost can vary from $15,000 to more than 2 hundred th… Read More
Posted on Oct 8 The effect to achieve in this article is to encrypt the HTML source code and ensure that the encrypted HTML can still be used normally when viewed as plain t… Read More