
8 Cloud Security threats evolved during pandemic COVID-19
Since COVID-19 has hit the world with its wrath, the business world has turned upside down, companies are shifting to cloud-native
Since COVID-19 has hit the world with its wrath, the business world has turned upside down, companies are shifting to cloud-native
A vulnerability, which was classified as problematic, was found in Apache PDFbox up to 2.0.23. This affects some unknown processing
For Infrastructure WAF-App Security The Prophaze Cloud WAF detects and blocks suspicious activity using behavioral based threat detection algorithms. Its
Prophaze Blog Defending Against Cross-Domain Attacks: The Role Of Unified Security With Prophaze The cybersecurity landscape in 2025 has seen
Rate Limiting Ensuring Security and Availability Prophaze WAF API supports rate limiting to prevent and ensure the stability and reliability
AWS WAF The Ultimate Protection Solution to Secure your Web Application Deploying Prophaze on your on-premises AWS workloads allows you
Education Securing Education Sectors for Comprehensive Protection Prophaze offers protection against malicious activities in off/down hours and detecting bad IP
Malicious Bots are the computer programs that automatically perform the specified tasks for which they are created to harm the
Prototype Pollution Prototype Pollution is a vulnerability affecting JavaScript. Prototype Pollution refers to the ability to inject properties into existing
Layer 3 – 7 DDoS Protection Advanced Defense of Strengthening Your Security Prophaze protects your API endpoints deployed in the
Overview : A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that
Overview : In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might
Overview : The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial
Overview : In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can
Overview : On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.2, under certain conditions, TMM may crash or stop processing new traffic with
Overview : Multiple issues was discovered in SAP products Affected Product(s) : SAP Solution Manager 720 SAP Enable Now before
Overview : HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 Information Disclosure and DDoS Vulnerabilities Affected Product(s) : This vulnerability
Automated Bot Protection from Bad Bots A leading construction company that helps buyers with home projects from the very beginning
Overview : New vulnerabilities discovered in MediaWiki Affected Product(s) : MediaWiki before 1.19.4 and 1.20.x before 1.20.3 Vulnerability Details :
Overview : Multiple flaws was discovered in Honeywell equIP and Performance Series IP Cameras Affected Product(s) : Security Notification SN
Overview : Cisco Aironet Access Points Unauthorized Access Vulnerability CWE-284 / CVE-2019-15260 A vulnerability in Cisco Aironet Access Points (APs) Software could
Overview : Latest vulnerabilities discovered in SAP products Affected Product(s) : SAP Vulnerability Details : CVE ID : CVE-2019-0367 [CVE-2019-0367] Missing
Overview : Cisco Firepower Management Center Remote Code Execution Vulnerability CWE-20 / CVE-2019-12689 A vulnerability in the web-based management interface
Overview : Cisco IOS XE Software NAT Session Initiation Protocol Application Layer Gateway Denial of Service Vulnerability CWE-399/ CVE-2019-12646 A