Why are corporate Web Applications a popular point of attack for hackers?
Usually because they are often not well programmed or tested and therefore have vulnerabilities that a hacker can find and exploit.
Which Web Applications can be protected with Deception technology?
Any application that is accessible from the Web can be enhanced by Deception technology.
Why are Web Applications a popular point of attack?
Usually because they are often not adequately tested and therefore have vulnerabilities that a hacker can exploit.
Which Web Applications are particularly vulnerable?
Every application on the Internet is vulnerable, especially if users can log in and retrieve services or data. Thus, the website of a public institution could in principle be just as interesting for hackers as online banking, a webstore or a fundraising by a non-profit organization.
Which vulnerabilities are particularly interesting for hackers?
Error pages, entries in robots.txt, interesting subdomains, etc. are very exciting for attackers. Although these are not displayed to the user visiting the application with the browser (and therefore often forgotten during testing), they are of course visible to hackers and their tools.
How is an attacker redirected into the Deception environment?
When the Web Application Deception is active, the Web Application is loaded with special lures that are indistinguishable from the actual application for the hacker. Once redirected to the decoys, the attacker can no longer cause any damage in the actual application and the responsible IT system administrator gets notified via an alert.