
The CSP and SRI Illusion: Why They Don’t Stop eSkimming
by Source Defense For years, teams have leaned on Content Security Policy (CSP) and Subresource Integrity (SRI) to defend the browser. For client-side attacks like
If you haven’t addressed client-side security, your WebSec strategy is incomplete. The 3rd party digital supply chain that your business relies upon to drive the user experience is the same pathway your adversaries rely upon to steal sensitive customer data – credit card data, PII, PHI…it is all ready for the taking due to the vulnerabilities introduced by the 3rd party JavaScript running on your web properties.
You need to enable the business – which means you can’t do away with these third parties – but you need to also ensure data is protected at the point of input. Without full visibility into your 3rd party digital supply chain, or a mechanism to control the actions of the scripts running on your websites, your organization is at risk of material losses both in the form of security response and fines for data privacy non-compliance.
Cyber-criminals have shifted their focus to stealing data at the point of input. Source Defense is the pioneer in client-side security and we want to help you better understand the issue and plug this critical gap in your websec strategy. Below you can find a number of resources that will help you better understand the client-side security and data privacy issue.
Should you have any questions – open a chat or drop a request for a meeting.

by Source Defense For years, teams have leaned on Content Security Policy (CSP) and Subresource Integrity (SRI) to defend the browser. For client-side attacks like

Last week Source Defense gathered hundreds of the world’s largest merchants, Payment Service Providers, QSACs and Card Associations to hear from a prominent group of leading thinkers in compliance and data security standards to talk about the upcoming deadline and changes to PCI DSS 4.0.

A notorious Chinese-speaking threat actor, known for skimming credit card numbers off e-commerce sites and point-of-sale service providers across Asia/Pacific, has expanded its target scope to North and Latin America.

Learn about the recent discovery of a sophisticated series of Magecart attacks by the Source Defense research team and how cybercriminals are targeting online payment data. Discover attack vectors and potential prevention strategies to protect your business from similar threats.

How much do you know about client-side attacks on web applications? Did you know that this is an area of 3rd party risk that is lingering on your customer facing websites? Did you know that these attacks could cost you millions in losses?
Digital skimming, formjacking, clickjacking, ad injection, content defacement, and Magecart attacks are some of the biggest threats to organizations doing business online. These attacks take advantage of vulnerabilities utilized first- and third-party JavaScript running on websites.
Download this whitepaper to learn more about:
Cybercriminals like those in the Magecart syndicate are increasingly targeting unprotected web applications on the client side because the JavaScript security gap highlighted here is an opportunity too lucrative for them to ignore.