Advanced Topic of the Week: Validating SessionIDs

This week's topic discusses how to validate application SessionIDs submitted by clients.

Read More

WASC WHID Bi-Annual Report for 2010

The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a record of web ...

Read More

Advanced Topic of the Week: Real-time Blacklist Lookups

This week's feature is the effective use of Real-time Blacklist lookups (@rbl).

Read More

Advanced Topic of the Week: Transformation Functions

This week's feature is the effective use of Transformation functions.

Read More

OWASP ModSecurity CRS Project Promoted to Release Quality

I am excited to announce that the OWASP ModSecurity Core Rule Set (CRS) has completed its official ...

Read More

OWASP ModSecurity Core Rule Set (CRS) v2.0.8 Released

Greetings everyone, I wanted to announce the availability of the OWASP ModSecurity CRS v2.0.8. ...

Read More

ModSecurity Happy Hour @ Black Hat USA

ModSecurity Community,

Read More

Impedance Mismatch and Base64

There was a recent blog article stating that ModSecurity can be bypassed by adding invalid ...

Read More

ModSecurity Training at Blackhat USA 2009

Just a quick note to let everyone know that a 2-day ModSecurity training class was added to the ...

Read More

ModSecurity Vulnerabilities Fixed

ModSecurity versions 2.5.8 and 2.5.9 have been released to fix two vulnerabilities which could be ...

Read More

Fixing Both Missing HTTPOnly and Secure Cookie Flags

In a previous post I showed how you can use both ModSecurity and Apache together to identify/modify ...

Read More

Helping Protect Cookies with HTTPOnly Flag

If you are unfamiliar with what the HTTPOnly cookie flag is or why your web apps should use it, ...

Read More

Securing WebGoat using ModSecurity

This year, the OWASP's Summer of Code event contains one project that's of particular interest to ...

Read More

ModSecurity's Source Code Repository Is Now Open

I spent the last week importing ModSecurity's source code repository into subversion at Source ...

Read More

ModSecurity at ApacheCon US 2008

In a few weeks' time I will present my favourite talk, Web Intrusion Detection with ModSecurity, at ...

Read More

ModProfiler Presentation at OWASP AppSec Israel 2008

I will be giving the updated version of our ModProfiler presentation this Sunday (14th) at the ...

Read More

ModProfiler: Leading ModSecurity Towards Positive Security

Several years ago, a few more than I'd like to admit, I realised our chances for writing completely ...

Read More

ModSecurity Issue Tracker Now Available

I am happy to announce that we've just launched a public issue tracking facility for ModSecurity. ...

Read More

Microsoft and Oracle Helping 'Time-to-Fix' Problems

Before I talk to the title of this post, I have to provide a little back story. I have had an ...

Read More

ModSecurity 2.5.6 and Mlogc

The ModSecurity Log Collector (mlogc) is used to send ModSecurity audit log data to a console or ...

Read More

ModSecurity In Solaris

Although Solaris has been supported as a platform for ModSecurity since the very beginning, it has ...

Read More

Enough With Default Allow Revision 2

A revised version (but still a draft) of the Enough With Default Allow in Web Applications! paper ...

Read More

Enough with Default Allow in Web Applications!

The title of this blog post is also the title of a research paper we are currently working on. ...

Read More

XSS Defense HOWTO

We all agree that cross-site scripting is a serious problem, but what continues to amaze me is the ...

Read More

ModSecurity In HP-UX Internet Express

We receive questions about ModSecurity running on HP-UX from time to time, but since we don't have ...

Read More

ModSecurity Licensing Exception Draft Is Ready

As you may know, ModSecurity is licensed under GPL version 2. This license has served us reasonably ...

Read More

ModSecurity Is Blooming

OWASP AppSec Europe 2008 in Ghent, which I wrote about in a previous post, indeed felt like a ...

Read More

What's the Score of the Game - Part 2: Web Security Metrics

In my earlier post entitled "What's the Score of the Game?" I presented the concept that what ...

Read More