The evolution of cybersecurity through cyberattacks: the SQL slammer worm

After the Morris Worm and the Melissa Virus, let’s continue our time travel through the cyberattacks that have made cybersecurity practices history. In 2003, the SQL slammer worm spread across the Internet and turned off large parts of the server infrastructure within minutes. Due to its impact, patch management practices were implemented to ensure critical […]
Best practices in API security

According to a recent report from Imperva (a Thales company), organizations lose $94- $186 billion every year to vulnerable or insecure APIs abused by bots. The report highlights that this security threat accounts for up to 11.8% of global cybersecurity events and losses, highlighting a new trend in cyberattacks. In this article, we want to […]
One year of Negative PID

At Negative PID, we have just celebrated our first year in business. Saying it’s been a wild ride would be reductive. It’s been a lot of hard work, surprises, but most of all, a big learning curve. In this post, our founder, Simona, summarizes what it’s been like to create a company from the ground […]
Best practices for web app developers: designing web apps with a secure architecture

A robust architecture is the foundation of a secure web application, and adhering to best practices is essential to mitigate risks effectively. In our previous articles, we have explored how to prevent application-level and network-level session hijacking attacks. Let’s now delve into design implementations for crafting a secure architecture for web applications. Changing the way […]
Best practices for web app developers: preventing network-level session hijacking

In our previous article, we examined the best practices for preventing application-level hijacking attacks. We’ll now discuss using secure protocols to implement security measures for network-level session hijacking threats. What is network-level session hijacking? Network-level session hijacking occurs when an unauthorized user intercepts and takes over a session between a client (in this case, a […]
Best practices for web app developers: preventing application-level session hijacking

Developers typically have one goal in mind: building functional, user-friendly applications. However, being a good coder only sometimes means that the application is well-built from a security perspective. Most of the time, security is an afterthought with last-minute modifications to comply with basic requirements. There are so many threats to web applications that more than […]