Magecart Web Skimming Attacks and PCI DSS Compliance

PCI DSS Compliance and Magecart Web Skimming Attacks

< Back to Webinars


Any organization that accepts, transmits or stores credit card data must be compliant with PCI DSS and its extensive security requirements. However, as thousands of retailers keep being breached by Magecart credit card skimming attacks, cardholder data is being stolen by the millions and put for sale in underground markets. Retailers are failing to detect these attacks, which remain active for 22 days on average.

What does this mean for PCI DSS compliance? Is PCI DSS supplying retailers with enough information to defeat Magecart attacks? Are retailers in noncompliance with PCI DSS?

Watch now!

In this webinar, we will:

  • Provide an overview of PCI DSS and the importance of compliance
  • Highlight security risks posed by third-party providers within the scope of PCI DSS
  • Explain how Magecart web skimming attacks work and which security weaknesses they exploit
  • Explain how to effectively mitigate Magecart attacks with a behavior-based approach

Meet the Speakers

Pedro Fortuna

Jscrambler CTO & Co-Founder

Justin Gage

Principal Consultant at Consult Hyperion

Related Resources

Blog Article

Silent Skimming vs Double-Entry Attacks

Case Study

Bionano Increases Compliance with Regulations Using Jscrambler

Blog

Jscrambler Introduces Solution Enhancements that Pave the Way to 1-Day PCI DSS Compliance

Blog

How to Stop Data Breaches in Your Business: A Strategic Overview

Blog

Navigating PCI DSS v4 Compliance: The CSP/SRI-Based Approach

Blog

Digital Skimming: the Definitive Guide

Learning Hub

Payment Page Security

On-Demand Webinar

Web Skimming Requirements in PCI DSS v4