Wallarm Blog
  • Wallarm Home
  • Products
    • Cloud-Native WAF
    • Wallarm FAST
  • How it works
  • Solutions
    • API Protection
    • Bot protection
    • WAF for Kubernetes
    • Attack mitigation
    • Compliance/PCI DSS
    • Vulnerability discovery
    • Perimeter scanning
  • Resources
    • Whitepapers
    • Datasheets
    • Customer Stories
    • WAF Documentation
    • FAST Documentation
    • API Reference
  • Partners
  • Company
  • Request a demo
In DevOps

Risks involved with operatorAliases in Sequelize

January 22, 2021 5 Mins Read

The risks involved with the operatorAliases option in Sequelize, the popular library for DBMSs

Read More
Consul by HashiCorp from Infoleak to RCE
In Researcher Corner

Consul by HashiCorp: from Infoleak to RCE

November 19, 2020 4 Mins Read

Consul is a software first released in 2014 for DNS-based service discovery. It provides distributed key-value storage, segmentation, and configuration.…

WAF JSON decoding capability required to protect against API threats like CVE-2020-13942 Apache Unomi RCE
In API Security

WAF JSON decoding capability required to protect against API threats like CVE-2020-13942 Apache Unomi RCE

November 18, 2020 3 Mins Read

New critical Apache Unomi exploit was released yesterday. As an official press release says: “Apache Unomi is the industry’s first…

Libdetection was integrated in Wallarm Node as new detection engine.
In Product updates

Libdetection: Introducing New Generation of Attacks Detection

October 19, 2020 3 Mins Read

In the latest version of Wallarm Node, we integrated a new attack detection engine that will work with a combination…

Cloudflare fixed an HTTP/2 smuggling vulnerability
In Cloud Security

Cloudflare fixed an HTTP/2 smuggling vulnerability

October 15, 2020 5 Mins Read

On July 14th, Emil Lerner found and explored new ways of HTTP desync/smuggling exploitation based on HTTP/2 request processing issues.…

In Different attack types

CVE-2020-24807: Preventing critical Socket.IO vulnerability

October 8, 2020 2 Mins Read

This year is full of extraordinary events and cybersecurity domains are not an exception. Massive WebSocket vulnerabilities are not so…

Cloud WAF product to provide best-in-class API protection right at the edge
In API Security

Wallarm launches Cloud WAF with the best-in-class API protection

October 7, 2020 3 Mins Read

An easy to use Cloud WAF and API protection package We are thrilled to announce the launch of the new…

In API Security

Meet JWT heartbreaker, a Burp extension that finds thousands weak secrets automatically

October 1, 2020 2 Mins Read

In the recent post (https://lab.wallarm.com/340-weak-jwt-secrets-you-should-check-in-your-code/), we presented a wallarm/jwt-secrets GitHub repository with a 340 JSON Web Token secrets available publicly.…

In Compliance

Exploiting Oracle WebLogic by Remote Code Execution with a /console endpoint restricted

September 22, 2020 3 Mins Read

This article explains how to exploit Oracle WebLogic for remote code execution by using valid credentials. It’s useful during black-box…

In API Security

Fetching Full-Text Alert Data with the Wallarm API

September 15, 2020 5 Mins Read

A lot of information about detected malicious requests is already available in the Wallarm console UI. However, the search functionality…

In API Security

340 weak JWT secrets you should check in your code

September 2, 2020 3 Mins Read

JSON Web Token (JWT) is the data format with bill-in signature and encryption mechanisms that are often used by modern…

Older Posts
  • Webinars

  • More insights

    • API Security
    • Cloud Security
    • Compliance
    • DevOps
    • Different attack types
    • FAST
    • GraphQL
    • Network Security
    • Owasp
    • Product updates
    • Researcher Corner
    • Securing payments
    • WAF
    • WAF evaluation
    • Wallarm News
    • Web Application Security
  • Wallarm Home
    • HTML Sitemap
  • Products
    • Cloud-Native WAF
    • Wallarm FAST
  • How it works
  • Solutions
    • API Protection
    • Bot protection
    • WAF for Kubernetes
    • Attack mitigation
    • Compliance/PCI DSS
    • Vulnerability discovery
    • Perimeter scanning
  • Resources
    • Whitepapers
    • Datasheets
    • Customer Stories
    • WAF Documentation
    • FAST Documentation
    • API Reference
  • Partners
  • Company
  • Request a demo

© 2020 Wallarm

Top

    Type above and press Enter to search. Press Esc to cancel.