Английская Википедия:ImmuniWeb
ImmuniWeb is a global application security company headquartered in Geneva, Switzerland. ImmuniWeb develops Machine Learning and AI technologies for SaaS-based application security solutions provided via its proprietary ImmuniWeb AI Platform.
Early Security Research
Security Advisories
The ImmuniWeb Security Research Team (formerly known as High-Tech Bridge) has released over 500 security advisories[1] affecting various software, with issues identified in products from many well-known vendors, such as Sony,[2] McAfee[3] Novell,[4] in addition to many web vulnerabilities affecting popular open source and commercial web applications, such as osCommerce,[5] Zen Cart,[6] Microsoft SharePoint, SugarCRM and others.
The Security Research Lab was registered as CVE and CWE compatible by MITRE.[7] It is one of only 24 organizations, globally, and the first in Switzerland, that has been able to achieve CWE certification.
The company is listed among 81 organizations, as of August 2013, that include CVE identifiers in their security advisories.[8]
Free Online Services and Related Research
ImmuniWeb launched an SSL/TLS configuration testing tool in October 2015.[9] The tool can validate email, web or any other TLS or SSL server configuration against NIST guidelines and checks PCI DSS compliance, it was cited in articles covering the TalkTalk data breach.[10][11]
Security and Privacy Research
Шаблон:AnchorThe discovery of vulnerabilities in Yahoo! sites by the company was widely reported,[12][13] leading to the t-shirt gate affair and changes in Yahoo's bug bounty program. The firm identified and reported four XSS vulnerabilities on Yahoo! domains, for which the company was awarded two gift vouchers to the value of $25.[14][15][16][17] The sparse reward offered to security researchers for identifying vulnerabilities on Yahoo! was criticized, sparking what came to be called t-shirt-gate,[18] a campaign against Yahoo! sending out T-shirts as thanks for discovering vulnerabilities. The company's discovery of these vulnerabilities and the subsequent criticism of Yahoo!'s reward program led to Yahoo! rolling out a new vulnerability reporting policy which offers between $150 and $15,000 for reported issues, based on pre-established criteria.[13][19]
In December 2013, the firm's research[20] on privacy in popular social networks and email services was cited[21][22] in a class action lawsuit for allegedly violating its members' privacy by scanning private messages sent on the social network.
In October 2014, the company discovered a Remote Code Execution vulnerability in PHP.[23] In December 2014, they identified the RansomWeb attack,[24] a development of Ransomware attacks, where hackers have started taking over web servers, encrypting the data on them and demanding payment to unlock the files.
In April 2014, the discovery[25] of sophisticated Drive-by download attacks, revealed how drive-by download attacks are used to target specific website visitors after their authentication on a compromised web resource.
In December 2015, the company tested the most popular free email service providers, for SSL/TLS email encryption.[26] Hushmail, previously considered as one of the most secure email providers, received a failing "F" grade. Just after, the company updated its SSL configuration and received a score of "B+".[27]
References
External links
See also
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ 13,0 13,1 Шаблон:Cite web
- ↑ Шаблон:Cite news
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite news
- ↑ Шаблон:Cite web
- ↑ Шаблон:Cite web