Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

WAF

Transforming SQL Queries Bypasses WAF Security

12 May 2022

A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application …

Tags Cloud Computing, Databases, Queries, SQL, WAF

Fine-tune and optimize AWS WAF Bot Control mitigation capability

22 February 2022

, Allow, and Count. That opens up opportunities to filter or construct queries against records in AWS WAF logs based on labels, and so …

Tags Amazon, AWS, Bots, Cloud Computing, WAF

WAF: Securing Applications at the Edge

2 February 2022

These days, brick-and-mortar or television-based bank robberies and heists seem old-fashioned no matter how well planned or executed. What …

Tags Application, IT, Open Source, Sponsored, WAF

Analyze AWS WAF logs using Amazon OpenSearch Service anomaly detection built on Random Cut Forests

24 January 2022

This blog post shows you how to use the machine learning capabilities of Amazon OpenSearch Service (successor to Amazon Elasticsearch …

Tags Cut, Forests, Random, Services, WAF

3 ways to improve your website security

17 January 2022

Every so often, you hear in the news that a company’s website was down temporarily for several hours, preventing visitors and consumers …

Tags How-To, Malware, Security Pro, Vulnerability, WAF

Why the updated OWASP Top 10 list can’t be addressed by WAF?

21 December 2021

The holistic approach for mitigating API driven cyber attacks Daily Newsletter – E-mail sent every business day with a recap of the last 24 …

Tags IT, OWASP Top 10, Spotlight, WAF, Why

Introducing the World’s First Free Cloud WAF to Secure Your Web Applications

20 September 2021

A web application firewall is a firewall that monitors, filters, and blocks statistics packets as they journey to and from an internet site …

Tags Cloud, Firewalls, IT, Secure, WAF

How to improve visibility into AWS WAF with anomaly detection

1 September 2021

The workflow of the solution is as follows: An HTTP request reaches the API Gateway …

Tags Amazon, AWS, Cloud Computing, How, WAF

The three most important AWS WAF rate-based rules

23 July 2021

In this post, we explain what the three most important AWS WAF rate-based rules are for proactively protecting your web applications …

Tags Amazon, Amazon Athena, AWS, AWS Shield, WAF

Automatically update AWS WAF IP sets with AWS IP ranges

8 July 2021

Note: This blog post describes how to automatically update AWS WAF IP sets with the most recent AWS IP ranges for AWS …

Tags Amazon, AWS, AWS Shield, Cloud Computing, WAF

Customize requests and responses with AWS WAF

21 June 2021

In March 2021, AWS introduced support for custom responses and request header insertion with AWS WAF. This blog post will demonstrate how …

Tags Amazon, AWS, Cloud Computing, Customize, WAF

DevOps didn’t kill WAF, because WAF will never truly die

14 May 2021

The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its …

Tags DevOps, DevSecOps, IT, Methodologies, WAF

Protecting an Airline from Bad Bots: A Case Study

8 April 2021

This APAC airline provides low cost domestic and international flights with hubs throughout the Pacific. Based on number of passengers …

Tags Airline, Bad Bots, Case Study, IT, WAF

Here’s How Healthcare Providers Can Stay Secure & Compliant

6 April 2021

Patients and healthcare staff require access to data 24×7 via remote locations, without delays or impacts from usage spikes. To ensure …

Tags Cloud Security, How, Providers, Secure, WAF
Post navigation
Older posts
Page1 Page2 Page3 Next →
Cookie-Free

NVD

  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-20797 – A vulnerability in the web-based management interface of Cisco Secure Network Analytics, f …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-20802 – A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-20806 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022
  • T-Soft E-Commerce 4 – ‘UrunAdi’ Stored Cross-Site Scripting (XSS)17 May 2022
  • Survey Sparrow Enterprise Survey Software 2022 – Stored Cross-Site Scripting (XSS)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »