SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Contrast Labs

Contrast Labs is a team of accomplished cybersecurity researchers and industry experts that perform application security threat analysis, security analytics, and other security research.

CONTRAST LABS: March 2018 AppSec Intelligence Report

Contrast Labs' analysis of real world application security data from March 2018. We're going to change it up a bit this month by expanding our coverage to include:

  • Both known and unknown vulnerabilities in custom code
  • Both known and unknown..
Continue Reading >>

CONTRAST LABS: February 2018 AppSec Threat Intelligence Report

Contrast Labs' analysis of real world application attack data from February 2018.

Overview

  • In February, overall application attack volume more than doubled. Once again this month there were no applications or APIs that were not attacked.
  • The..
Continue Reading >>

CONTRAST LABS: January 2018 AppSec Threat Intelligence Report

ByContrast Labs February 6, 2018

Contrast Labs' analysis of real world application attack data from January 2018.

Overview

  • In January, overall application attack volume just about doubled. Once again this month there were no applications or APIs that were not attacked.
  • Once..
Continue Reading >>

CONTRAST LABS: December AppSec Threat Intelligence Report

Contrast Labs' analysis of real world application attack data from December 2017.

Overview

  • December was a huge month for application layer attacks, with large increases in every category of attack except Padding Oracle. Overall, we saw a 5x..
Continue Reading >>

CONTRAST LABS: November AppSec Threat Intelligence Report

ByContrast Labs December 27, 2017

Contrast Labs analysis of real world attack data from November.

Observations

  • Overall attack traffic was down in November from our highs in August. Once again this month, virtually every application/API was attacked, and some were continuously..
Continue Reading >>

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook