Thank You

Your request has been submitted.

You will receive an analysis of the 3rd party partners on your site via email shortly.

The report analyzes the behaviors these 3rd parties take in every end-user session. 

We conduct this analysis to flag any potential security or data privacy concerns to organizations like yours. 

For more understanding of our mission, and the issues we seek to address, feel free to browse the information below.  


Understanding the Risk Introduced by Your Website Supply Chain

Critical Security Update for Adobe Commerce (Magento) Users

In the rapidly evolving world of e-commerce, security remains a top priority. As part of our ongoing commitment to safeguarding our clients, we are bringing an important update to your attention regarding Adobe Commerce (Magento). This update underscores the urgent need to take immediate action when it comes to protecting your customers’ data. It is the second time in as many weeks that a widespread client-side attack has been disclosed – providing support for the decision by the PCI Council to add eSkimming controls to PCI DSS 4.0, and driving home the fact that waiting for the compliance deadline is a risky decision. 

Read More »

Whitepapers Digging Deeper into the Issue

A 90-Day Action Plan for 6.4.3 and 11.6.1

Read what VikingCloud has to say about the Source Defense approach to eSkimming Security. As the pioneer in the field, Source Defense supports more than 1,000 of the world’s leading brands with a unique, prevention first, set-it and forget-it solution.

Read More »

Digital Skimming Infographic

Digital Skimming attacks are on the rise and the vast majority of eCommerce sites are exposed. 75% of all breaches Visa investigated last year involved eCommerce sites – with digital skimming attacks the top of the list. The bad news is that the partners you trust to power the customer experience are inadvertently opening the door to these attacks – exposing your customers to credit card fraud and identity theft.

Read More »

Past Webinars you might be interested in

[Recording] Understanding and Filling the Client-side Security Gap

Cloud computing, mobility, and the Internet of Things (IoT) have created a plethora of new attack surfaces. Defending the company’s perimeter gets compromised, as users and applications have moved outside, and often are located worldwide. In this webinar, we will show you, how to address the challenges of protecting the client-side.

Read More »