Tag

Protection

Browsing

We’ve just released a couple of features we’re really excited about Live Threat Verification results The Active Threat Verification component was always a unique feature of Wallarm. Having the ability to replay the attack/payload against the application (or its staging environment) gives our customers unique insights into critical events when an attacker identifies exploitable security issues. With this new improvement to the UI, you can now see a real-time view of the process of threat verification.…

We’ve got a lot of questions about how to protect your server against the shellshock bash vulnerability. Here are the answers. Very Important! Information about a critical vulnerability called Shellshock (or Bash Bug), which allows unauthorised code execution on remote systems, has been disclosed. Your servers and routers could possible be vulnerable. Currently, we are observing distributed scans of various subnets of the internet in search of vulnerable servers and theirs further infection with server…