ModSecurity Happy Hour at Blackhat USA 2011
I am excited to announce that SpiderLabs will be hosting a ModSecurity Happy Hour during the ...
Read MoreI am excited to announce that SpiderLabs will be hosting a ModSecurity Happy Hour during the ...
Read MoreThe ModSecurity Development Team is pleased to announce the release of the OWASP ModSecurity Core ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreIn this blog post, I will show a proof of concept method of leveraging Unicode Visual ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreIn a previous blog post entitled "ModSecurity Advanced Topic of the Week: Passive Vulnerability ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreSo my inbox lit up today with a Full Disclosure note about a vulnerability in Trustwave's ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss how to detect HTTP ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreSnort Web Attack Rules You may be familiar with the Emerging Threats project. They have a few Snort ...
Read MoreThe ModSecurity Development Team is pleased to announce the availability of ModSecurity 2.6.0-rc1 ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreMozilla's Content Security Policy (CSP) Mozilla has developed a fantastic security capability into ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss how to detect potential ...
Read MorePlanting of Malware Planting of malware links into legitimate websites in order to conduct ...
Read MoreAlert Management - Correlated Events One important alert management issue for security analysts to ...
Read MoreOne of the most under-appreciated capabilities of web application firewalls (WAFs) is traffic ...
Read MoreAs many of you may have heard, there is an interesting Java DoS scenario out -
Read MoreThe Inevitable Bypass of Blacklist Filtering Let's face the facts, blacklist filtering as a means ...
Read MoreYesterday, we released Trustwave's Global Security Report 2011 (short registration required). This ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss how to detect and prevent ...
Read MoreThe just released CRS v2.1.0 includes Credit Card Tracking rules. These will both track legitimate ...
Read MoreI am pleased to announce the release of the OWASP ModSecurity Core Rule Set (CRS) v2.1.0. This is a ...
Read More