We are thrilled to announce a new release of Wallarm Node™. It’s a brand-new version of the Wallarm filter instance (NGINX-based), with new features and a host of optimizations.

Significant refactoring has resulted in improved performance. Optimizations were made to provide sophisticated security checks with near-zero latency. This has been a critical request for our customers with massive-load applications.

The Wallarm Node 2.0™ release, introduces support for Websocket protocol. We believe Wallarm™ to be the very first web application firewall (WAF) with a full WebSocket support. We continue to address new threats for the modern web. Filter instance is now capable of detecting and blocking attack payloads within WebSockets protocol. Additional optimizations were done for popular WebSocket-based frameworks, such as: ASP.NET SignalR and Socket.io. To enable attack detection for WebSockets, you need to use wallarm_parse_websocket on directive in location section or apply it for the whole server in the NGINX configuration file.

Wallarm Node 2.0™ implements enhanced analysis of XML-based data to provide better protection for applications and APIs (SOAP, etc.). This change is especially valuable as we observe an increasing number of attacks targeting XXE vulnerabilities.

Wallarm Node 2.0™ is now even easier to configure. We eliminated a troublesome shm_size parameter which results in no longer needing to setup the size of the local blocking ruleset; everything is done automatically. We listen to our customers and we know how it bothered you before!

To upgrade to Wallarm Node™, just update your nginx-wallarm package with your Linux package manager or use the updated Docker container which is available at Docker Hub.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

7 days ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 week ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

2 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

4 weeks ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

4 weeks ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago