Follow and Subscribe

Xavier Stevens

, null
May 29
We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.
May 29
We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.
August 3, 2023
Announcing the Network Effect Threat Report, Fastly’s threat intelligence report with insights based on unique data from April to June of 2023
August 3, 2023
Announcing the Network Effect Threat Report, Fastly’s threat intelligence report with insights based on unique data from April to June of 2023
June 9, 2023
What you need to know about CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
June 9, 2023
What you need to know about CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability
July 20, 2022
TLS fingerprinting has become a prevalent tool to help security defenders identify what clients are talking to their server infrastructure.
July 20, 2022
TLS fingerprinting has become a prevalent tool to help security defenders identify what clients are talking to their server infrastructure.
May 3, 2022
Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…
May 3, 2022
Threat hunting is the practice of looking for active attackers who have possibly penetrated security boundaries within an organization. WAF data can be a valuable resource in threat hunting…
March 31, 2022
In this post, we review details for two RCE vulnerabilities impacting Spring Cloud and Spring Framework, including how Fastly customers can protect themselves from this vulnerability.
March 31, 2022
In this post, we review details for two RCE vulnerabilities impacting Spring Cloud and Spring Framework, including how Fastly customers can protect themselves from this vulnerability.

Ready to get started?

Get in touch or create an account.