Enough With Default Allow Revision 2

A revised version (but still a draft) of the Enough With Default Allow in Web Applications! paper ...

Read More

Three ModSecurity Rule Language Annoyances

There are three aspects of the ModSecurity Rule Language we are not very happy with. One comes from ...

Read More

Enough with Default Allow in Web Applications!

The title of this blog post is also the title of a research paper we are currently working on. ...

Read More

XSS Defense HOWTO

We all agree that cross-site scripting is a serious problem, but what continues to amaze me is the ...

Read More

ModSecurity In HP-UX Internet Express

We receive questions about ModSecurity running on HP-UX from time to time, but since we don't have ...

Read More

ModSecurity Licensing Exception Draft Is Ready

As you may know, ModSecurity is licensed under GPL version 2. This license has served us reasonably ...

Read More

Integrating Vulnerability Scanners and Web Application Firewalls

In case you missed it, Breach Security has teamed up with WhiteHat Security so that their Sentinel ...

Read More

ModSecurity Is Blooming

OWASP AppSec Europe 2008 in Ghent, which I wrote about in a previous post, indeed felt like a ...

Read More

What's the Score of the Game - Part 2: Web Security Metrics

In my earlier post entitled "What's the Score of the Game?" I presented the concept that what ...

Read More

ModSecurity Training at Blackhat USA

We are excited to announce that Breach Security will be running the 2-day ModSecurity Bootcamp ...

Read More

What's the Score of the Game?

We, as the webappsec community, should try and move away from "Holy Wars" debating that there is ...

Read More

ModSecurity 2.6 RoadMap

ModSecurity 2.6 will likely be the last branch before ModSecurity 3. The 2.6 branch will ...

Read More

ModSecurity 2.5 Phrase Match Operator Performance

Quite a few people have asked about the performance differences between using the regular ...

Read More

ModSecurity Party in Ghent on May 20th

In my previous post, in which I was commenting on the OWASP AppSec agenda, I forgot to mention the ...

Read More

ModSecurity Community Console v1.0.3 Now Available

I've just released an update to ModSecurity Community Console, our free audit log aggregation ...

Read More

ModSecurity Training at OWASP AppSec Europe

We are excited to announce that a ModSecurity 2-day training class has been added to the upcoming ...

Read More

ApacheCon Europe: Web Intrusion Detection with ModSecurity

I've had a pleasure of participating in ApacheCon Europe in Amsterdam this week. Paradoxically, ...

Read More

Web Application Firewall Concepts

I went through all my ModSecurity Blog posts yesterday, partly to admire myself for blogging ...

Read More

ModSecurity User Survey

With the release of ModSecurity 2.5 yesterday, this seemed like the perfect time to get feedback ...

Read More

ModSecurity 2.5 Released

The final version of ModSecurity 2.5.0, the long awaited next stable version of ModSecurity, is now ...

Read More

Web Hacking Incidents Database Annual Report for 2007

Breach Labs which sponsors WHID has issued an analysis of the Web Hacking landscape in 2007 based ...

Read More

ModSecurity 2.5 Status

The ModSecurity 2.5 release is scheduled for early/mid February. With the ModSecurity 2.5 release ...

Read More

Content Injection Use Case Example

ModSecurity 2.5 introduces a really cool, yet somewhat obscure feature called Content Injection. ...

Read More

Yes, the Tide for Web Application Firewalls is Turning

Some time ago I decided to start a new blog, a place where I would be able to address the topics ...

Read More

ModSecurity Data Formats

I have just added a new section to the ModSecurity v2.5 Reference Manual, describing the data ...

Read More

Speaking About ModSecurity at ApacheCon Europe 2008

I will be speaking about ModSecurity at ApacheCon Europe in Amsterdam later this year. I hear ...

Read More

SQL Injection Attack Infects Thousands of Websites

Here is a snippet from the just released SANS NewsBites letter:

Read More

Set-based Pattern Matching Example

Large Wordlist Example You will find the greatest benefit of using the set based matching opertors ...

Read More