Back to blog

Follow and Subscribe

Fastly Security Research Team

Fastly Security Research Team, Fastly

The Fastly Security Research Team focuses on ensuring our customers have the tools and data available to them to keep their systems secure. They analyze and ultimately help prevent attacks at Fastly scale. The team is a group of behind-the-scenes security experts who are here to help you stay on the cutting edge of the ever-evolving security landscape.

Page 2 of 2

How to Secure your GraphQL

Fastly Security Research Team, Simran Khalsa

There are many benefits to adopting GraphQL, but its security implications are less understood. In this post, we’ll explore those implications and offer guidance on which defaults and controls can support a safer GraphQL implementation.

Engineering
Security

WAF framework measures WAF effectiveness | Fastly

Fastly Security Research Team, Simran Khalsa, + 1 more

Our new WAF efficacy framework provides a standardized way to measure the effectiveness of a WAF’s detection capabilities through continuous verification and validation. Here’s how it works.

Engineering
Security

Log4Shell attacks (CVE-2021-44228) insights | Fastly

Fastly Security Research Team, Xavier Stevens, + 1 more

We’re sharing our latest data and new insights into the Log4j/Log4Shell vulnerability (CVE-2021-44228 + CVE-2021-45046) in this post in order to help the engineering community cope with the situation. We also share our guidance around testing your environment against many of the new obfuscation methods that have been seen.

Industry insights
Security

Log4Shell exploit found in Log4j | Fastly

Fastly Security Research Team, Xavier Stevens, + 1 more

CVE-2021-44228 is a Remote Code Execution vulnerability in the Apache Log4j library being actively exploited. We provide our observations into the exploit and a summary of its impact.

Security
Engineering

Subresource monitoring with Compute

Fastly Security Research Team

Compute, our serverless compute environment, can be used to solve headaches dealing with attackers looking to modify and manipulate resources. In this post, we tell you how.

Security
Compute

Preventing SSRF: Apache CVE-2021-40438 | Fastly

Fastly Security Research Team

Our Security Research Team provides guidance on how to address CVE-2021-40438, a vulnerability in Apache HTTP Server version 2.4.48 and earlier, by patching impacted version(s) and enabling a new templated rule to prevent exploitation.

Engineering
Security

Protect against Apache vulnerability | Fastly

Fastly Security Research Team

The recent Apache HTTP Server vulnerability (CVE-2021-41773) is reportedly being exploited in the wild. Fastly already detects this vulnerability, but our next-gen WAF customers can also create a rule to block exploitation.

Security

Atlassian Confluence OGNL Injection Vulnerability Protection | Fastly

Fastly Security Research Team, Xavier Stevens, + 1 more

Our Security Research Team has built and deployed a rule to help protect customers of our next-gen WAF against the recently announced Confluence Server OGNL injection vulnerability, CVE-2021-26084.

Security

Next-Gen WAF for Microsoft Exchange | Fastly

Fastly Security Research Team, Xavier Stevens, + 1 more

Fastly’s security research team has built and deployed a rule to protect Signal Sciences Next-Gen WAF customers against the recently announced Microsoft Exchange Server vulnerabilities.

Product
Security