Wallarm API Security Wallarm updates logo

Wallarm updates

Discover the latest features, improvements, and updates in Wallarm API Security

Subscribe to Updates

Labels

  • All Posts
  • API Security
  • WAAP
  • ANNOUNCEMENT
  • IMPROVEMENT
  • FIX
  • FAST

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • August 2021
  • April 2021
  • March 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • October 2019
  • August 2019
  • April 2019
IMPROVEMENT
2 years ago

Backup your rules and keep calm

Wallarm rules are one of the critical mechanisms by which the Wallarm API Security solution adapts to your applications. Therefore, it is crucial to have a backup copy of your rules in case of unforeseen situations; for example, important rules were deleted by mistake.

To undo the changes and return to the previous version of the ruleset, create backup copies of your Wallarm rules. There are two types of backups available to you:

  • Backups that are created automatically on any change in a ruleset.
  • Backups that you create manually.

Backups are managed in the Rules section of Wallarm Console. You can create a new backup of the rules anytime or restore the ruleset from a created copy.

You can find more detailed information on this capability in our documentation.

Avatar of authorWallarm team
API Security
2 years ago

Analyze and reduce your attack surface

With these new dashboard widgets, you can now easily analyze critical vulnerabilities and identify weaknesses in your system:

  • The CVEs widget shows you what vulnerabilities are being used by attackers when attacking your infrastructure, allowing you to assess the impact and take protective measures as necessary.

  • The Authentication widget shows you which authentication protocols are being targeted by attackers, allowing you to identify weaknesses and compromised credentials, and take preventative steps as necessary.

You can find more detailed information in our documentation.

Avatar of authorWallarm team
ANNOUNCEMENT
2 years ago

Enhanced Wallarm Sidecar proxy solution

We are pleased to announce the general availability of the Wallarm Sidecar proxy v2.0 solution!

The Wallarm Sidecar proxy v2.0 solution is a stable, safe, and scalable capability for your security stack. With this release, we updated our Sidecar solution to leverage new K8s capabilities and a wealth of customer feedback.

Among all the possibilities of Wallarm sidecar proxy v2.0, we can highlight the following:

  • Injects into the K8s Pods automatically
  • Simplifies protection of discrete microservices and their replicas and shards by providing the deployment format that is similar to applications
  • Requires minimum service configuration to secure your apps; just add some annotations and labels for the application pod to protect it
  • All Wallarm features available in the latest version 4.2 are supported by the Sidecar proxy v2.0 solution

If you are using the previous version, we recommend you migrate to the Wallarm Sidecar proxy v2.0 solution. For assistance in migrating to the Wallarm Sidecar proxy solution v2.0, please contact support@wallarm.com.

If you are looking for a security solution to protect applications deployed as Pods in a Kubernetes cluster, the Wallarm Sidecar solution is one of the options along with the Wallarm Ingress controller. More details on Wallarm Sidecar proxy v2.0 solution 

Wallarm supports many other deployment options, like AWS Terraform module, CDN and regular DEB and RPM packages. To get all supported options, please refer to Wallarm documentation.

If you have any questions, feel free to contact our support team at support@wallarm.com.

Avatar of authorWallarm team
ANNOUNCEMENT
2 years ago

Updates from Wallarm’s detection team (August 2022)

We are pleased to announce our latest attack and vulnerability detection improvements!

For Wallarm Scanner to detect vulnerabilities with even lower false positives, we have refactored the following detection rules:

  • Main SQLi vulnerability detection rules, with cover of additional obfuscation types
  • XSS vulnerability detection rules

Attack detection accuracy has been improved by adding the following attack detection rules:

  • New Path Traversal attack detection rules - in particular, Tomcat Path Traversal via reverse proxy mapping detection
  • Various Web-Shell upload detection rules

These changes are already supported by the Wallarm platform, and no additional product configuration changes are required.

Avatar of authorWallarm team
IMPROVEMENT
2 years ago

Native Datadog integration

Wallarm now offers native integration with Datadog! Datadog is a SaaS-based dynamic data analytics platform used in many security and operational tech stacks.  

Wallarm has made it a priority to include native integration with specialized tools used by DevOps and SecOps teams. This integration with Datadog furthers that vision. 

This integration allows you to analyze and process Wallarm API Security events along with data from your other services and products in Datadog. Thus you will have a complete picture of what is happening in your infrastructure.

You can find more detailed information on this capability in our documentation.

Avatar of authorWallarm team
ANNOUNCEMENT
2 years ago

Wallarm Node 4.2 - protection from BOLA, neutralizing dangerous JWT and more

We are pleased to announce the release of Wallarm Node 4.2.

Here is a list of the new features which will be available after upgrading:

BOLA / IDOR Detection

When an API-based application is vulnerable to Broken Object Level Authorization (BOLA), also known as Insecure Direct Object References (IDOR), there is a strong possibility of sensitive information or data being exposed. Attackers can exploit vulnerable API endpoints by manipulating the object ID which is sent within the request. 

To prevent exploitation of this vulnerability, Wallarm Node 4.2 contains a new trigger which you can use to protect your endpoints from BOLA attacks. The trigger monitors the number of requests to a specified endpoint and creates a BOLA attack event when trigger thresholds are exceeded.

Inspecting JWTs for Malicious Payloads

Wallarm Node 4.2 also brings Deep Request Inspection capability for JSON Web Token (JWT) data formats. While this will enable many new upcoming features related to the authentication tokens, Node 4.2 expands attack detection for all content encoded in JWTs. All data encoded in a JWT is automatically unpacked/decoded and checked for the different types of malicious payloads (RCE and others).

Other Updates

CentOS 6 and Debian 9 distributions are no longer supported. There are also some changes related to the logic of denylists. A more detailed changelog and instructions on upgrade are published in the official documentation.

If you have any questions, feel free to contact our support team at support@wallarm.com 

Avatar of authorWallarm team
API Security
2 years ago

Manage your external and internal APIs separately

When defending your APIs, you need a clear understanding of their structure, what resources they use, and how users or systems interact with them.

The Wallarm API Discovery module automatically determines which API hosts are accessible from external networks and which from internal networks, using real traffic data rather than relying on the documentation provided by the development team. This allows you to analyze your API structure more effectively, enabling you to use different scenarios and approaches for internal vs external resources. For example, it is probably much more critical to know if PII is being transmitted to externally-accessible endpoints as opposed to endpoints which are only internally accessible.

See the Wallarm documentation for more details.

Avatar of authorWallarm team
API Security
2 years ago

Stay up-to-date with changes in your APIs

APIs are like living organisms, always changing and evolving. It is essential to keep track of such changes, as they can seriously affect the security of your entire solution. For example, PII and other sensitive data may unexpectedly begin transferring to an endpoint, or you have a new undocumented endpoint, also known as a Shadow API.

The Wallarm API Discovery module solves these problems. This module continuously keeps track of changes that occur in your APIs and displays them in the Wallarm Console:

  • which endpoints appear in your API structure
  • what changes have occurred in these endpoints
  • which endpoints are no longer called and should be assessed

See the Wallarm documentation for more details.

Avatar of authorWallarm team
API SecurityWAAP
2 years ago

Improved visibility of API threats

See the Wallarm documentation for more details.We have improved our dashboards to make it easier to analyze malicious traffic and identify critical attack vectors:

  • The new API Protocols widget raises the visibility of the system's protocols and the associated attacks. This widget helps you to detect the emergence of new unapproved protocols or track a significant change in the number of attacks. With one click you can go from the widget to the Events tab to analyze the details of attacks on the selected protocol.

  • The Attack Sources and Attack Targets widgets are now more compact, making it easier to analyze the location of threat sources and the assets that these threats are directed at. The widget "Attack Targets" have now two view option: statistics by domains and statistics by applications. This enables you to analyze attacks surface even for misconfigured applications.

image.png

See the Wallarm documentation for more details.

Avatar of authorWallarm team
ANNOUNCEMENT
2 years ago

Spring Data MongoDB SpEL Expression Injection Vulnerability (CVE-2022-22980)

Background

On June 20, 2022 Spring released Spring Data MongoDB 3.4.1 and 3.3.5 to address a critical CVE report:

  • CVE-2022-22980: Spring Data MongoDB SpEL Expression injection vulnerability through annotated repository query methods.

This vulnerability was originally reported on June 13, 2022.

Vulnerability

This vulnerability affects Spring Data MongoDB applications using repository query methods that are annotated with @Query or @Aggregation and use parameterized SpEL statements. A specific exploit requires non-sanitized input to the repository query method.

Wallarm Provides Protection

We tested Wallarm’s attack detection against known exploits and have confirmed that they were successfully detected and blocked. No further actions are required when working in blocking mode.

To mitigate this vulnerability when working in monitoring mode, please contact our support team if you want us to create the rule.

Feel free to reach out to support@wallarm.com if you need assistance.

Further updates will be published in Wallarm Changelog: https://changelog.wallarm.com

Avatar of authorWallarm team