My heritage is Sri Lankan. But, at the age of 15 I moved to France as a refugee, fleeing a civil war. Starting a new life from scratch in France, without speaking French, was certainly an interesting journey. But I was lucky enough to have support from…
Win-KeX Version 2.0
We have been humbled by the amazing response to our recent launch of Win-KeX. After its initial release, we asked ourselves if that is truly the limit of what we can achieve or could we pull off something incredible to mark the 25th anniversary of Hack…
Headwinds and Tailwinds – Cycling For Climate Awareness in a Global Pandemic
If you told me at the beginning of 2020 that I’d be cycling 250 miles in the remote Upper Peninsula of Michigan, fundraising for an organization called “Climate Ride”, and wearing a face mask to go grocery shopping – I would not have believed you. Yet…
When Hackers Take Advantage of Your Trusted Vendors
As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out …
Unprecedented Levels of Ransom DDoS Extortion Attacks
The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai’s Se…
Web Application and API Protection: From SQL Injection to Magecart
SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 1…
Philippine Air Force receives full delivery of Elbit Hermes 900 and Hermes 450 medium altitude long endurance UAVs
MaxDefense received confirmation from military and industry sources that the Philippine Air Force (PAF) has received full delivery of all nine (9) Hermes 900 and four (4) Hermes 450 medium altitude long endurance unmanned aerial vehicles (MALE UAV) fr…
Every Application Should Be Behind a WAF
It’s no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, busines…
The FBI Intrusion Notification Program
The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when Ellen Nakashima reported on it for the Washington Post …
Metrics That Matter: Continuous Performance Optimization
To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers ar…