Jiju JacobIntegrating WAF into K8s Kong API GatewayIn this post, we will integrate a WAF (Web Application Firewall) into our API Gateway. We have selected Wallarm WAF. And we are integrating…Mar 23, 20221
Ivan NovikovBypassing NGFW/WAFs using data format obfuscationsA lot of network security solutions today supports a lot data format inside HTTP and other protocols. The main question here is…May 30, 20171
InWallarmbyIvan NovikovExtending fuzzing with Burp by FASTI love Burp Suite, like really. It’s the most convenient tool to visualize what’s happening with apps, how requests look like and to test…Nov 11, 2018Nov 11, 2018
Qrator LabsQrator Labs 2017 Report on CybersecurityWe would like to present you, the reader, a shorter version of the annual Qrator Labs report on cyber- and infosecurity, as well as DDoS…Mar 19, 2018Mar 19, 2018
Ivan NovikovWhat you didn’t know about OWASP Top-10 2017? Part 3/3This is the last part of my trilogy about OWASP Top-10 2017 risks. Two previous parts (one and two) described A1-A6 risks and this time I’d…Feb 13, 2018Feb 13, 2018
Jiju JacobIntegrating WAF into K8s Kong API GatewayIn this post, we will integrate a WAF (Web Application Firewall) into our API Gateway. We have selected Wallarm WAF. And we are integrating…Mar 23, 20221
Ivan NovikovBypassing NGFW/WAFs using data format obfuscationsA lot of network security solutions today supports a lot data format inside HTTP and other protocols. The main question here is…May 30, 20171
InWallarmbyIvan NovikovExtending fuzzing with Burp by FASTI love Burp Suite, like really. It’s the most convenient tool to visualize what’s happening with apps, how requests look like and to test…Nov 11, 2018
Qrator LabsQrator Labs 2017 Report on CybersecurityWe would like to present you, the reader, a shorter version of the annual Qrator Labs report on cyber- and infosecurity, as well as DDoS…Mar 19, 2018
Ivan NovikovWhat you didn’t know about OWASP Top-10 2017? Part 3/3This is the last part of my trilogy about OWASP Top-10 2017 risks. Two previous parts (one and two) described A1-A6 risks and this time I’d…Feb 13, 2018
Ivan NovikovWhat you didn’t know about OWASP Top-10 2017? Part 2/3In my previous post I covered first 3 of the OWASP Top-10 2017 risks. Today I’d like to continue this and explain the next 3 risks:Feb 1, 2018
Ivan NovikovWhat you didn’t know about OWASP Top-10 2017? Part 1/3I hope everybody have already read the latest OWASP Top-10 list (https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf). Let…Jan 29, 2018
InWallarmbyWallarmCIOReview names Wallarm in “20 Most Promising Enterprise WebApp Solution Providers”Mar 7, 2017