High-Tech Bridge Security Research
High-Tech Bridge devotes significant internal resources to continuous security research. Some of the security studies we perform are regularly published in our blog. Vulnerabilities that our security researchers discover almost every week, help software vendors to improve security and reliability of their products. Above 300 large vendors fixed security vulnerabilities thanks to High-Tech Bridge Security Research Lab, including Microsoft, IBM, Novell, McAfee, Sony, HP, Samsung, PHP, OpenOffice, Corel, WordPress, Joomla, OpenX, SugarCRM, MantisBT, e107, MODX, Bitrix and many others.
|526||Security Advisories |
Patch Available Upon Disclosure
|2014 Q3 100%|
|2014 Q2 92%|
|2014 Q1 94%|
|2013 Q4 89%|
|2013 Q3 92%|
|2013 Q2 100%|
Vendor Average Time to Patch
|2014 Q3 21 days|
|2014 Q2 18 days|
|2014 Q1 12 days|
|2013 Q4 8 days|
|2013 Q3 13 days|
|2013 Q2 30 days|
Cybersecurity and geopolitics are intertwined July 29, 2015
What is the relation between growing security spending, increasing hacking attacks and falling economy?
How to manage PCI DSS 3.1 Requirement 6.6 for your web applications July 24, 2015
One of the PCI DSS 3.1 requirements is Requirement 6.6 dedicated to web application security. In this blog post we will try to understand how to comply with the requirement in cost-efficient manner.
Think your website isn’t worth anything to hackers? Think again July 22, 2015
Have you ever thought about the cost of your website compromise?
Practical step-by-step guidance after your company has been hacked July 1, 2015
Everybody tends to think that hackers will never ever target them or their company/organisation until a breach occurs. We have already published several practical examples explaining why hackers target you and your data. Here, I will try to concentrate on post-incident actions and provide some brief advice on what to do after you have been hacked.
The most common information security mistakes of e-commerces June 22, 2015
Almost every month a new incident involving a big retailer, e-commerce or web platform makes the news headlines. Most retail fraud is now committed online, and in 2014 alone hackers managed to steal more than 61 million records from retailers. We will try to analyze the most common managerial and operational mistakes retail organizations make when defending against hackers.