Mitigate HTTP/2 Rapid Reset Threats with Imperva WAF

In the modern application landscape, where businesses are constantly under the threat of cyber attacks, one of the most recent to emerge is HTTP/2 Rapid Reset, a type of Distributed Denial-of-Service attack.
This attack is larger than any previously reported application layer incident, with the largest recorded attack surpassing an alarming 398 million requests per second.
HTTP/2-based DDoS attacks are a new breed of cyber threats that have primarily targeted Google services and Cloud customers.
The main objective of HTTP/2 was to enhance efficiency.
The very features that make HTTP/2 more efficient for legitimate clients can also be exploited to make DDoS attacks more potent.
The HTTP/2 protocol allows clients to indicate that a previous stream should be canceled by sending a RST STREAM frame.
This feature is exploited in the HTTP/2 Rapid Reset attack, where the client opens a large number of streams at once and then cancels each request immediately.
This allows each connection to have an indefinite number of requests in flight, creating an exploitable cost asymmetry between the server and the client.
The Imperva Web Application Firewall offers a robust defense against a multitude of cyber threats, including the HTTP/2 'Rapid Reset' DDoS attack and provides unparalleled visibility into these attacks.
Our WAF's reporting capabilities offer customers a comprehensive and detailed view of all attack vectors, as illustrated in the dashboard below.
The extensive visibility extends to the intricacies of each attack, revealing patterns and trends that can inform future security strategies.
With Imperva WAF, you are protected against DDoS attacks and empowered with the knowledge to proactively mitigate future threats.
While HTTP/2-based DDoS attacks pose a significant threat, Imperva WAF is designed to protect a business from all forms of DDoS attacks.
It leverages a global network of scrubbing centers to absorb large volumetric attacks, and its advanced algorithms accurately identify and mitigate application layer attacks.
In addition to its robust protection features, Imperva WAF also provides integrated Attack Analytics that correlate DDoS and related critical events to focus on what truly matters.
This allows your business to quickly adjust security policies on the fly based on recommended actions to stop attacks in their tracks.
As stated in a previous blog post past, as a member of the security community, Imperva values its collaborations with companies such as Google and Fastly.
Our world is more secure when our industry collaborates to tackle complex security challenges.
If you need protection from HTTP/2-based attacks, contact us.


This Cyber News was published on www.imperva.com. Publication date: Wed, 03 Jan 2024 16:13:06 +0000


Cyber News related to Mitigate HTTP/2 Rapid Reset Threats with Imperva WAF

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Mitigate HTTP/2 Rapid Reset Threats with Imperva WAF - In the modern application landscape, where businesses are constantly under the threat of cyber attacks, one of the most recent to emerge is HTTP/2 Rapid Reset, a type of Distributed Denial-of-Service attack. This attack is larger than any previously ...
6 months ago Imperva.com
Imperva Named an Overall Leader in the KuppingerCole Leadership Compass: API Security and Management Report - We're thrilled to share that Imperva has achieved the prestigious status of Overall Leader in the KuppingerCole Leadership Compass: API Security and Management report. A notable achievement is being recognized as one of the few non-gateway-first ...
7 months ago Imperva.com
Accelerating Cloud-Native Data Security Deployments at Scale with Imperva's eDSF Kit - Elastic DSF is the vision of DSF. The first phase of this vision is creating automatic, click of a button processes to deploy and upgrade DSF with the introduction of Imperva eDSF Kit. eDSF Kit simplifies the product deployment, upgrades, and ongoing ...
7 months ago Imperva.com
Imperva Detects Undocumented 8220 Gang Activities - Imperva Threat Research has detected previously undocumented activity from the 8220 gang, which is known for the mass deployment of malware using a variety of continuously evolving TTPs. This threat actor has been known to target both Windows and ...
6 months ago Imperva.com
Imperva Client-Side Protection Mitigates the Polyfill Supply Chain Attack - The recent discovery of a website supply chain attack using the cdn. Polyfill.io domain has left many websites vulnerable to malicious code injection. Once a trusted resource for adding JavaScript polyfills to websites, the domain has recently become ...
4 days ago Imperva.com
Imperva & Thales: Pioneering a New Era in Cybersecurity - Imperva has been a beacon of excellence for over twenty years in the digital protection landscape, where innovation is paramount. Renowned for its groundbreaking products, Imperva has not just secured applications, APIs, and data for the world's ...
7 months ago Imperva.com
Imperva Protects Customers from CVE-2023-50164 - On December 7, 2023, Apache released a security advisory regarding CVE-2023-50164, a critical vulnerability in Apache Struts with CVSS score 9.8. Versions from 2.5.0 to 2.5.32 and 6.0.0 to 6.3.0 were affected. Apache Struts is a popular, free, ...
6 months ago Imperva.com
Imperva Report Previously Undocumented 8220 Gang Activities - Imperva Threat Research team has recently discovered a previously unreported activity from the 8220 gang, which is well-known for mass-deploying a range of constantly evolving TTPs to distribute malware in large quantities. The threat actor has a ...
6 months ago Cysecurity.news
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
5 months ago Securityzap.com
Imperva Uncovers New IoCs for AndroxGh0st Botnet - On January 16, a joint alert from FBI and CISA warned about a concerning development: the emergence of a botnet driven by AndroxGh0st malware targeting vulnerable applications and web servers. RoxGh0st is a Python-based malware, first seen in late ...
5 months ago Imperva.com
Imperva defends customers against recent vulnerabilities in Apache OFBiz - On December 26, researchers from SonicWall Capture Labs discovered an authentication bypass vulnerability in Apache OFBiz, tracked as CVE-2023-51467. This bug has a CVSS score of 9.8 and allows attackers to achieve server-side request forgery by ...
6 months ago Imperva.com
CVE-2024-36950 - In the Linux kernel, the following vulnerability has been resolved: firewire: ohci: mask bus reset interrupts between ISR and bottom half In the FireWire OHCI interrupt handler, if a bus reset interrupt has occurred, mask bus reset interrupts until ...
1 month ago Tenable.com
Cybersecurity Trends: Shaping the Future Landscape - Embark on a journey through the ever-evolving landscape of cybersecurity, where hidden threats and silent breaches shape the digital realm. AI is transforming the cybersecurity landscape by enhancing threat detection and mitigation, ushering in a ...
3 months ago Securityzap.com
Key Events of 2023 for NSFOCUS WAF - Let's take a look at the key events of NSFOCUS WAF in 2023. June 2023: NSFOCUS Tops China's Hardware WAF Market for Four Consecutive Years in IDC market share research report on China's hardware WAF market share;. Effective supervision and compliance ...
5 months ago Securityboulevard.com
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses - Automating mundane tasks and driving data-driven decisions, big data enables businesses to make better decisions and drive transformation. The use of AI has been shown as an effective way of streamlining operations and enhancing security measures, ...
6 months ago Cysecurity.news
Bad Bots Drive 10% Annual Surge in Account Takeover Attacks - Internet traffic associated with malicious bots now accounts for a third of the total, driving a 10% year-on-year increase in account takeover attacks last year, according to Imperva. The Thales-owned company's 2024 Imperva Bad Bot Report is a ...
2 months ago Infosecurity-magazine.com
Protecting Your Digital Realm: Understanding Cybersecurity Threats and Defenses - Understanding the different types of cyber attacks and implementing robust security measures is crucial in safeguarding sensitive data and systems from malicious intent. In the dynamic landscape of cyberspace, threats to digital security continue to ...
5 months ago Feeds.dzone.com
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
3 months ago Securityboulevard.com
How Much Do You Know About the Files Entering Your Endpoints? - Malware remains a significant and pervasive threat in the digital age, with its impacts being felt across various sectors globally. The threat of malware extends beyond healthcare. Organizations must prioritize enhanced visibility in their digital ...
5 months ago Securityboulevard.com
Unpatched Rapid SCADA Vulnerabilities Expose Industrial Organizations to Attacks - The Rapid SCADA open source industrial automation platform is affected by several vulnerabilities that could allow hackers to gain access to sensitive industrial systems, but the flaws remain unpatched. The US cybersecurity agency CISA published an ...
5 months ago Securityweek.com
Revolutionizing Cybersecurity: Integrating UEBA for Enhanced Data Protection - There is a transformative shift taking place in cyber security, once a fortress built on rigid protocols and reactive measures. A major component of this evolution is the departure from traditional threat detection, which emphasizes context and ...
4 months ago Cysecurity.news
CVE-2007-2850 - The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a ...
6 years ago
In the Crosshairs: Addressing Emerging Threats Through Adaptive Software Development - To counteract these ever-changing threats, organizations must adopt adaptive responses that can dynamically adjust to new challenges and vulnerabilities. This article zeroes in on the crucial intersection of adaptive software development and ...
3 months ago Cybersecuritynews.com
CVE-2024-35931 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)