Detecting Malice with ModSecurity: IP Forensics
This week's installment of Detecting Malice with ModSecurity will discuss the value of obtaining ...
Read MoreThis week's installment of Detecting Malice with ModSecurity will discuss the value of obtaining ...
Read MoreI would like to introduce a new blog series entitled - Detecting Malice with ModSecurity and will ...
Read MoreWe are proud to announce the new release 2.5.13 is under development and will be released next ...
Read MoreAs a result of the acquisition of Breach Security (and thus ModSecurity) by Trustwave, we thought ...
Read MoreI am excited to announce that Breno Silva has joined Trustwave's SpiderLabs Research Team where he ...
Read MoreMany reports have indicated that malicious PDFs that exploit flaws in Adobe's Acrobat Reader are ...
Read MoreIntroduction In last week's post on Identifying Improper Output Handling, we showed a method to use ...
Read MoreA Topic Presents Itself
Read MoreThis week's topic discusses how to validate application SessionIDs submitted by clients.
Read MoreThe Web Hacking Incident Database (WHID) is a project dedicated to maintaining a record of web ...
Read MoreThis week's feature is the effective use of Real-time Blacklist lookups (@rbl).
Read MoreThis week's feature is the effective use of Transformation functions.
Read MoreI am excited to announce that the OWASP ModSecurity Core Rule Set (CRS) has completed its official ...
Read MoreGreetings everyone, I wanted to announce the availability of the OWASP ModSecurity CRS v2.0.8. ...
Read MoreWe are starting a new blog post series here on the ModSecurity site called "Advanced Feature of the ...
Read MoreSince Black Hat and DEFCON we have been busying building teams and aligning objectives over here at ...
Read MoreThere was a recent blog article stating that ModSecurity can be bypassed by adding invalid ...
Read MoreI presented on the OWASP ModSecurity Core Rule Set (CRS) Project yesterday here at the AppSec DC ...
Read MoreJust a quick note to let everyone know that a 2-day ModSecurity training class was added to the ...
Read MoreModSecurity versions 2.5.8 and 2.5.9 have been released to fix two vulnerabilities which could be ...
Read MoreIn a previous post I showed how you can use both ModSecurity and Apache together to identify/modify ...
Read MoreIf you are unfamiliar with what the HTTPOnly cookie flag is or why your web apps should use it, ...
Read MoreThis year, the OWASP's Summer of Code event contains one project that's of particular interest to ...
Read MoreI spent the last week importing ModSecurity's source code repository into subversion at Source ...
Read MoreIn a few weeks' time I will present my favourite talk, Web Intrusion Detection with ModSecurity, at ...
Read MoreI will be giving the updated version of our ModProfiler presentation this Sunday (14th) at the ...
Read More