Protocol attacks exploit weaknesses in network communication protocols, such as TCP, UDP, and ICMP, aiming to exhaust server resources or disrupt normal operations. Web Application Firewalls (WAFs) and Content Delivery Networks (CDNs) are powerful tools to mitigate these attacks by filtering malicious traffic and distributing the load. Web Application Firewall (WAF) A Web Application Firewall […]
Introducing API Security – Access Control Protection
Application Programing Interfaces (API) are foundational to how most of today’s modern applications work. By design, they enable two systems to communicate and transfer information. When implemented correctly, we don’t realize we’re interfacing with APIs. They are, however, found in almost everything we interact with daily – websites, mobile apps, kiosks at malls and airports, […]
Proactive Website Security with Custom Honeypots – A NOC Feature
Honeypotting is an art form and there are many different types of honeypots an organization can create. Regardless of the type of honeypot, they are designed to give bad actors a target within a controlled environment so that we can better understand their tactics and improve our own security. There should never be legitimate users […]
Ecommerce Security: Why Hosted Payment Pages and Strong Security Headers Are Essential
Recently, we consulted on a breach involving a major ecommerce website where attackers compromised the checkout process to steal customers’ payment card data. This attack exploited vulnerabilities in how the site managed payment pages, highlighting critical lessons for all ecommerce operators. The attackers injected malicious JavaScript into the application, targeting an onclick action when users […]
Essential Email Security Tips for Domain Owners
As a business owner, email is a cornerstone of your operations—especially if you use a custom domain (e.g., tony@noc.org). Ensuring your email security is crucial to protect against cyber threats like phishing, spoofing, and account takeovers. This guide provides actionable tips to strengthen your email security and keep your business safe. Why Email Security Matters […]
Bringing A Domain to Life: Choosing Between Closed and Open Web Platforms
Choosing how to bring your domain to life is an important decision. Like with everything, the $10 / year annual subscription for the domain itself is only the beginning. One of the more important, and often overlooked, decision is choosing between Open and Closed platforms. This is a relatively new phenomena, thinking within the last […]
Registries, Registrars, and DNS: The Backbone of the Internet
The internet relies on several critical components to function seamlessly. Among these, registries, registrars, and the Domain Name System (DNS) play pivotal roles. While these terms may seem technical, they are integral to how we navigate and interact with the online world every day. In this article, we’ll break down what these components are, how […]