Detecting Malice with ModSecurity: Request Method Anomalies
This week's installment of Detecting Malice with ModSecurity will discuss how to detect HTTP ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss how to detect HTTP ...
Read MoreEvents over the last seven days have dramatically underlined the pitfalls and difficulties of ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreSnort Web Attack Rules You may be familiar with the Emerging Threats project. They have a few Snort ...
Read MoreThe ModSecurity Development Team is pleased to announce the availability of ModSecurity 2.6.0-rc1 ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreIn May 2010, the final disappearance of the line between physical and virtual security became ...
Read MoreMozilla's Content Security Policy (CSP) Mozilla has developed a fantastic security capability into ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreWeb application penetration testers, have you ever run into a situation where you can inject into ...
Read MoreThis is a follow-up post to ModSecurity Advanced Topic of the Week: Malware Link Detection in which ...
Read MoreWith the recent fraudulent certificate incident involving one of Comodo's RAs there is a renewed ...
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreNew Licensing Trustwave is commited to the development of the ModSecurity project and in supporting ...
Read MoreCommunity Contribution - cmdLine This week's topic highlights a community contribution by long time ...
Read MoreA new SpiderLabs Radio - Hack It! Edition podcast has been uploaded.
Read MoreThese are the lastest entries added by SpiderLabs to the Web Application Security Consortium (WASC) ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss how to detect potential ...
Read MorePlanting of Malware Planting of malware links into legitimate websites in order to conduct ...
Read MoreSpiderLabs just released our WASC Web Hacking Incident Database (WHID) Semiannual Report for 2010 ...
Read MoreAlert Management - Correlated Events One important alert management issue for security analysts to ...
Read MoreThe SpiderLabs team at Trustwave published a new advisory today, which details a vulnerability ...
Read MoreLast July myself and Christian Papathanasiou presented a DEF CON 18 talk entitled "This is not the ...
Read MoreMost things I do seem really awesome at the time. Like the time I was at the Italian restaurant ...
Read MoreOne of the most under-appreciated capabilities of web application firewalls (WAFs) is traffic ...
Read MoreIn this post I'll continue on the topic of data encryption (see my previous post on Encrypting Data ...
Read MoreOne of the key feature differentiators between ModSecurity and other commercial WAFs has long been ...
Read More