5 Most Shared Application Security Posts in 2016 — Research Blog

How was your 2016? We know that for most businesses it was a little rough especially on the cybersecurity front. As more and more companies prepare for cloud and digital domains, there is growing ambiguity on security. Unfortunately, 2016 didn’t help. In fact, it was the weakest year in the history with close to a thousand reported data breaches.

Number of Data Breach Incidents-Yearly

As we predicted last year, in our trend prediction blog post, ransomware, app DDoS and loss of Personally Identifiable Information (PII) created most trouble for big and small businesses. We hope that this article helped our clients and readers close weak points well in advance.

Not that we look back, our research articles reached thousands of people worldwide helping them overcome security challenges. So, we bring you a list of top five most shared posts that will prove valuable in the coming year too.

What Is SQL Injection?

How can a 17-year old vulnerability still top the OWASP Top 10 list? Given that SQL Injection is accountable for most data breaches, this post provides valuable information on understanding the vulnerability, its impact and ways to get rid of it.

OWASP Part 4: Mobile Application Risks

The last part of our popular OWASP Top 10 Series juxtaposed user-friendliness with security loopholes. It helped business owners look for loopholes in their mobile apps and close the gaps with the help of their team.

Google URLs Found Vulnerable to Open Redirect

What can a simple vulnerability such Open Redirection do? Should businesses and customers really worry about them? This post sheds light on how invalidated redirects and forwards cause damage to business reputation and loss of business.

6 Things You Should Know About DDoS Attacks

Application layer DDoS attacks cause massive damage, especially by taking the website down for hours or days. This research article shatters many perceptions on Layer 7 attacks and how they affect every company that has a website.

3 Steps to Stop Hackers

Is there a simple guide for application security? Bookmark this one for all your questions on finding security loopholes, fixing them instantly and stopping app DDoS attacks.

Originally published at www.indusface.com on January 31, 2017.




Indusface is an award-winning application security leader protecting 800+ customers spread across 17 countries.

Love podcasts or audiobooks? Learn on the go with our new app.

Ambrosus Swap Announcement

ProBit Global Lists Galaxia (GLX)

Find Suspicious activity

Karma Cats NFT: Explosive Launch Details, Mint Price, and More!

Hack The Box Write-Up : Buff

Spoofing and Phishing

Bluehost Review

Bamboo: Security Process

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Indusface is an award-winning application security leader protecting 800+ customers spread across 17 countries.

More from Medium

Shifting left to improve application security

Shifting Left To Improve Application Security — Photo by <a href=”https://unsplash.com/@alexandermils?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Alexander Mils</a> on <a href=”https://unsplash.com/?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Unsplash</a>

Soft-deleted projects in Azure DevOps Server

SAP Commerce Cloud (CCV2) — Azure CICD Pipeline

Security Management with SYNK