The ICO Fines Ticketmaster UK £1.25 Million for Security Failures: A Lesson to be Learned

The ICO Fines Ticketmaster UK £1.25 Million for Security Failures: A Lesson to be Learned

Ticketmaster UK, a leading ticketing company and part of Ticketmaster, has been fined £ 1.25 million by the Information Commissioner’s Office (ICO) as it failed to protect customer data during the infamous February 2018 data breach. The company is still not taking ownership of the breach, caused by a third-party ...

Content Security Policy (CSP): Not Exactly a Magecart Vaccine

Content Security Policy (CSP): Not Exactly a Magecart Vaccine

With millions of buyers escalating their online activity ahead of Black Friday and the holiday season, it’s important for eCommerce websites and online businesses to combat Magecart and web-skimming issues in a proactive and relentless manner. Can the proven and tested Content Security Policy (CSP) get the job done? Without ...

How Black Friday and Cyber Monday Can Go From a Retailer’s Dream Into a CiSO’s Worst Nightmare

How Black Friday and Cyber Monday Can Go From a Retailer’s Dream Into a CiSO’s Worst Nightmare

The shopping season which begins on Black Friday rolling over to Cyber Monday, is actually one of the most critical times for online retailers. During this period promotions are offered, new products are launched, and the shopping websites themselves invest all their resources to increase the volume of purchases. Unfortunately, ...

3 Web Third-Party Related Events You Don’t Want to Miss from August-September 2020
September 3, 2020

3 Web Third-Party Related Events You Don’t Want to Miss from August-September 2020

As the end of 2020 is approaching, we see more evidence of the rising risks relating to installed third-party apps running on websites. In this month’s top 3 events we will review the 102-day Warner Music Group breach, how web skimmers were able to use Telegram, and the most interesting UltraRank ...

Why and How are Enterprise Companies, Like eBay, Actively Port-scanning End-users’ Computers From Their Websites
August 31, 2020

Why and How are Enterprise Companies, Like eBay, Actively Port-scanning End-users’ Computers From Their Websites

You might have recently heard that eBay is performing port scanning, while online shoppers are visiting their website. At first glance, it will probably sound a bit strange, as port scanning is an internal network action. As such, it is designed to detect services and should not be related to ...

Taking Third-Party Application Security to the Next Level: Version 2.8’s Multiple Website Dashboard
August 19, 2020

Taking Third-Party Application Security to the Next Level: Version 2.8’s Multiple Website Dashboard

Version 2.8 Goes LIVE!  Almost any organization today uses dozens of websites and subdomains. Each provides essential functions and uses dozens of third-party apps and tags to produce its capabilities. Those assets are managed by multiple teams on the enterprise level and medium-large organizations, requiring different conduct and high-level attention. ...

The Cybersecurity Effects of Fourth-Parties on Websites

The Cybersecurity Effects of Fourth-Parties on Websites

Fourth party apps on websites are commonly referred to as “the vendor’s vendor code”. Fourth-party apps may offer additional benefits, but at the same time they also carry a set of threats while running on your websites. For your users, they are all, first-parties. In this article, we will refer ...

3 Web Third-Party Related Events You Don’t Want to Miss from May-June 2020 
July 2, 2020

3 Web Third-Party Related Events You Don’t Want to Miss from May-June 2020 

3 Web Third-Party Related Events You Don’t Want to Miss from May-June 2020  As always, we are working day and night to bring you the top 3 news picks related to third-party risks on websites. In this post we will review the “new trend” of ongoing attacks that remain undiscovered. ...

Introducing the new Application Owner Alerts Workflow Tool!
July 1, 2020

Introducing the new Application Owner Alerts Workflow Tool!

One of the biggest challenges we face while helping our customers mitigate third-party risks, is that not all incidents are clear cut, as in not everything is “good vs. evil”. Some vendors should have access to users’ data, while some should not. Some applications are managed by the marketing department, ...