{"id":7617,"date":"2020-07-19T04:19:55","date_gmt":"2020-07-19T11:19:55","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7617"},"modified":"2023-07-10T14:48:02","modified_gmt":"2023-07-10T21:48:02","slug":"how-safe-are-web-proxy","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/how-safe-are-web-proxy\/","title":{"rendered":"How Safe are Web Proxy?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

With the Corona pandemic devastating lives around the world, cybercriminals and threat actors have joined the fray to take advantage of this situation. <\/span><\/strong><\/p><\/blockquote>

Today, the reliance on applications such as web proxy, remote conferencing, VPNs, etc. are at an all-time high which is\u00a0yet another reason for threat actors to work overtime to exploit vulnerabilities.<\/span><\/p>

We recently released an in-depth research report called Cyber Risks in Remote Working series where we examined popular web proxy applications used\u00a0by employees\u2019 world over.<\/p>

Key findings<\/strong><\/h3>

The report provides an in-depth study of web proxy applications and the inherent vulnerabilities that exist within them.<\/p>