cside

171 posts

cside banner
cside

cside

@csideai

The only client-side security company with a proxy solution. Gain visibility into every 3rd party script, attack, fraud attempt, and AI agent on the client-side

[email protected] Katılım Mart 2024
35 Takip Edilen288 Takipçiler
cside retweetledi
Chargebacks911
Chargebacks911@Chargebacks911·
📅 March 26th at 1pm EST | Live Webinar with @csideai! Join us to learn how issuer expectations are changing, what stronger dispute evidence looks like today, and how to better protect revenue. Register free: hubs.li/Q046J9Vr0 #Chargebacks | #Payments
English
0
1
1
48
cside
cside@csideai·
Observing a surge in client-side fetches happening to msclairty[.]com hijacking referral tokens. Still unclear of the extension responsible but judging by the volume it must be top one of the 5000 browser extensions.
cside tweet media
English
1
0
1
140
cside
cside@csideai·
🚨 Magecart Alert 🚨 A live Magecart skimmer on payment pages is exfiltrating credit card data in violation of PCI DSS. Script downloaded from: hxxps://meriksshadowfiend[.]top/moritz-ca/metrics.js Sending stolen data to: hxxps://pixelnotinggo[.]top/api/accept-metrics
cside tweet media
English
0
1
4
3.7K
cside
cside@csideai·
Multiple shipped features this month 🤩 Full details on cside. dev/changelog.
English
0
0
4
885
cside
cside@csideai·
A browser extension can quietly remove critical security headers like CSP. No warning. No consent. You install an extension and suddenly, protections against data leaks and injections are gone. Should we make this an explicit opt-in? Or will that see no adoption?
cside tweet media
English
0
0
3
454
cside
cside@csideai·
❗️We've identified a Magecart-like attack on the OpenCart CMS platform, mainly targeting East-Asian e-commerce websites cside.dev/blog/magecart-…
English
0
1
1
305
cside
cside@csideai·
This is what makes client-side attacks so dangerous. Dynamism is a sword that cuts both ways. Attacker leverage this to stay undetected for days, weeks and months.
English
0
0
2
325
cside
cside@csideai·
Yesterday CoinMarketCap got struck by a substantial client-side attack. Impacting all logged in users to reauthenticate their wallet access, and inadvertently grating access to a bad actor.
GIF
English
1
0
1
249
cside
cside@csideai·
Hello from Gartner! Come visit us at booth 971 in the startup zone.
cside tweet media
English
0
0
0
247
cside
cside@csideai·
We analyzed an attack on a Magento-based eCommerce site. The injection technique used hides in plain sight as the attacker is using ‘Google .com’ to deliver and execute their own code. cside.dev/blog/weaponize…
English
0
3
5
692
cside
cside@csideai·
We’re at InfoSec all week! Booth B133, come say hi!
cside tweet media
English
0
1
2
245
cside
cside@csideai·
A new attack found in Progressive Web Apps (PWAs). They are browser-based too after all, and are also targets in client-side attacks. cside.dev/blog/chinese-a…
English
0
2
4
364
cody
cody@devlooskie·
we're hiring a fullstack engineer @ @csideai! if you: - are obsessed with creating polished UI - love working with ts, react, tailwind, and graphql - willing to solve unique problems - want to learn about the deep-ends of the web c/side is for you 👉 cside dot dev/careers
English
2
8
32
4.6K
cside
cside@csideai·
If you’re serious about client-side security, you need runtime protection that sees what scripts actually do in your users' browsers. CSP is like locking your front door while leaving the windows wide open.
English
0
0
1
122
cside
cside@csideai·
If you believe “strict CSP” is enough, look at Magecart, PII leaks, or the rise of fake browser updates. CSP couldn't save them, and neither will it save you.
cside tweet media
English
1
0
2
252
cside
cside@csideai·
"But we use CSP so we're fine" ❌ No, you’re not. CSP was designed to protect you from things like XSS. But in reality, a CSP is blind as a bat. If you trust a vendor’s domain, CSP lets it right through. If that vendor gets compromised? CSP shrugs.
GIF
English
1
0
2
357
cside
cside@csideai·
Thanks people at BSides and RSAC! After the conferences, we hosted a rooftop afterparty for +500 people. A great way to close out the week. Thanks to @SocketSecurity, @arcjet and @incident_io for co-hosting with us 💙
cside tweet mediacside tweet mediacside tweet mediacside tweet media
English
0
0
5
163