Follow and Subscribe

Fastly Security Research Team

February 23
In this post, we will discuss a low latency approach to detect these attacks by co-locating the password hashes in a KV Store, along with Compute on Fastly’s edge.
February 7
Being able to test and validate rule behavior is critical to a maintainable WAF. With our WAF Simulator, you can validate rules in a safe simulation environment.
December 14, 2023
To gain a broader understanding of the threat landscape during "Cyber 5" weekend, we analyzed attack activities with a particular focus on commerce sites.
December 13, 2023
We're excited to announce Fastly's new WAF Simulator, which simplifies the testing process and provides the following key benefits.
November 20, 2023
Vulnerabilities are an unfortunate inevitability. However, when using a WAF there are options for your security teams while waiting for a patch.
October 3, 2023
We have discovered two instances of insecure deserialization in Cacti versions prior to 1.2.25, tracked as CVE-2023-30534.
August 22, 2023
In this post, we'll explore the application vulnerability directory traversal. What is it and how can you protect your apps from it?
August 3, 2023
Announcing the Network Effect Threat Report, Fastly’s threat intelligence report with insights based on unique data from April to June of 2023
July 11, 2023
What is an OS Command Injection? In this blog, we'll explore the web application vulnerability, OS Command Injection, and how to prevent it.
June 9, 2023
What you need to know about CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
February 28, 2023
NagiosXI versions 5.5.6 to 5.7.5 are vulnerable to three different instances of command injection.
October 19, 2022
Learn how User-Agent Client Hints work, explore privacy-related features and concerns, and how the partial adoption and incompleteness of this emerging standard can be used to detect…

Ready to get started?

Get in touch or create an account.