How applications are attacked
A year in application security


Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traffic, and automated bot activity. We have put that incredible visibility to use by profiling a year of attacks targeting the applications that run business.
Join Cloudflare Field CTO Trey Guinn and Product Marketing Director, in this on-demand webinar as they discuss key attacks that organizational security postures must account for in 2023 such as:
- Most commonly mitigated attacks
- The rise of brute force account takeover
- How DDoS attacks compares to application attacks
- The role of bad bots vs. verified bot traffic
- Where API traffic fits in - and how attackers target APIs
Download now to learn more.
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
AI is helping bad bots take over the internet
News Automated bot traffic has surpassed human activity for the first time in a decade, according to Imperva
By Bobby Hellard
-
Two years on from its Series B round, Hack the Box is targeting further growth
News Hack the Box has grown significantly in the last two years, and it shows no signs of slowing down
By Ross Kelly
-
Security experts issue warning over the rise of 'gray bot' AI web scrapers
News While not malicious, the bots can overwhelm web applications in a way similar to bad actors
By Jane McCallion
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott
-
T-Mobile security chief insists its defenses stood up to attacks linked to Salt Typhoon
News No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers
By Solomon Klappholz
-
Securing your network in every direction with zero trust
Whitepaper Webinar on the evolution of network security
By ITPro
-
Turning your log and incident data into real-time security insights
Whitepaper Integrate multiple data sources for a comprehensive security view
By ITPro
-
Do more with less: Optimizing servers with HPE to maximize VMware licensing
Whitepaper Your trusted guide through the changes in the virtualization market
By ITPro