Wallarm API Security Wallarm updates logo

Wallarm updates

Discover the latest features, improvements, and updates in Wallarm API Security

Subscribe to Updates

Labels

  • All Posts
  • API Security
  • WAAP
  • ANNOUNCEMENT
  • IMPROVEMENT
  • FIX
  • FAST

Jump to Month

  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • August 2021
  • April 2021
  • March 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • October 2019
  • August 2019
  • April 2019
IMPROVEMENT
a week ago

Introducing native integration between Wallarm API Security and AWS S3

We are excited to announce the integration of Wallarm End-to-End API Security with Amazon Web Services (AWS) S3. We understand that investigating incidents can be a complex and time-consuming process. With this new integration, Wallarm can now export detected malicious requests to AWS S3 for in-depth analysis and security incident investigation. 

This integration enables security analysts to:

  • Receive detected malicious requests from Wallarm to AWS S3
  • Conduct detailed analysis and investigations of security incidents
  • Correlate data from different sources to gain a comprehensive view of security events

By integrating Wallarm API Security with AWS S3, we are making it easier for security teams to detect and respond to security incidents quickly and effectively.

You can find more detailed information on this capability in our documentation.

Avatar of authorWallarm team
IMPROVEMENT
a month ago

Simplify Vulnerability Management with Wallarm's Jira integration

Wallarm, a leading provider of application security solutions, offers new integration with Jira, a popular issue and project tracking tool. With this integration, Wallarm will automatically create issues in these service for any vulnerabilities that it detects, making tracking and managing security issues easier.

By integrating Wallarm with Jira, SecOps teams can streamline their security operations and make it easier to identify and resolve vulnerabilities quickly. The automatic creation of events means that security teams no longer need to manually transfer information between services, saving time and reducing the risk of errors. This integration helps SecOps stay on top of their security posture and take action to address vulnerabilities before they can be exploited.

Wallarm is dedicated to helping customers secure their applications and data by providing tools such as the integration with Jira. Wallarm is making it easier for you to leverage the power of issue tracking tools to manage security operations, ensuring that vulnerabilities are identified and resolved quickly and efficiently.

You can find more detailed information about this integration in our documentation.

Avatar of authorWallarm team
IMPROVEMENT
a month ago

Protect Your APIs from OWASP API Security Top-10 2019 & 2023

Wallarm End-to-End API Security solution provides comprehensive protection against the OWASP API Security Top-10 threats. With the new OWASP API Security Top-10 dashboards provide you with complete visibility into the security state of your APIs, easy identification of your most critical security risks, and immediate ability to apply protective measures. 

The OWASP API Security Top-10 list of most commonly seen API threats helps to assess your API infrastructure and prioritize security risks. Additionally, it contains a set of recommendations for mitigating the identified risks. The main problem for defenders is that even with this list, it's incredibly hard to build an API security program, conduct ongoing assessments of different threats, and have adequate security controls and tooling in place. Therefore, defenders must determine which risks are the most critical for their situation and what measures are needed to mitigate those risks. 

Implementing a robust API Security program becomes much easier with the new OWASP API Security Top-10 dashboards from Wallarm. The automated security report enables you to pinpoint the most critical risks in your APIs, thoroughly analyze all associated events, and effortlessly apply appropriate security controls to mitigate them. By combining the strengths of complete visibility with real-time threat prevention, this feature reduces the risk of emerging threats, your workload, and your security costs. 

The new dashboards support both the current version of the OWASP API Security Top-10 2019 as well as the upcoming OWASP API Security 2023 (RC) release, anticipated to be launched later this year. For more detailed information on protection against the OWASP API Security Top-10 threats, please refer to our documentation.

Avatar of authorWallarm team
IMPROVEMENT
a month ago

Changes to API Discovery: Unused Endpoints now easier to identify

We would like to announce a change in our Wallarm API Discovery module. Previously, we used the term "Removed endpoint" to indicate that an endpoint was excluded from the API inventory because there were no more requests for it. For each endpoint, the date it was excluded from the model was calculated based on statistics showing how often the endpoint was requested.

Going forward, we will be using the term "Unused endpoint" instead of "Removed endpoint" to better reflect the status of these endpoints. An unused endpoint will now be defined as an endpoint that has not been requested in the last 7 days.

Calculating a time interval for each endpoint based on statistics could be non-obvious and difficult to analyze. By simply setting a fixed time period of 7 days, we are simplifying the process and providing a clear and consistent standard for identifying unused endpoints.

We believe that this change will improve the clarity and usefulness of our API Discovery module, making it easier for you to manage your APIs and ensure their security.

You can find more detailed information on this integration in our documentation.

Avatar of authorWallarm team
IMPROVEMENT
a month ago

Search in the Vulnerabilities section

We're thrilled to announce some exciting improvements to our Vulnerability section!

We have made it easier than ever to work with all your vulnerabilities in one place. The new search capabilities in the Vulnerability section will streamline your workflow and eliminate the need to switch back and forth between the Events and Vulnerabilities sections. From finding and analyzing to remediating and managing your vulnerabilities, all of your tasks can now be completed within one window. 

In addition, we moved the Vulnerability Scanner settings to the Vulnerabilities section to make it easier to configure the types of vulnerabilities that are detected.

We hope you find these improvements helpful and look forward to providing an even better experience for our users.

Avatar of authorWallarm team
IMPROVEMENT
a month ago

Wallarm API Token Management

We're excited to announce that our platform now offers improved API token management, which provides more flexibility and control over your API access to the Wallarm platform.

This new feature allows you to set token permissions at a granular level to limit access to specific data objects that Wallarm operates with: data on attacks or vulnerabilities, or nodes or API catalog, etc. It’s also possible now to set token expiration time based on your specific needs. 

You can easily assign and manage your own tokens, ensuring that you have the precise level of access required for different integrations with Wallarm. Administrators can also create shared tokens that are accessible to other admins, and even generate tokens based on existing roles, offering even more flexibility in access control.

The new API token management feature provides new opportunities for automating the deployment of Wallarm nodes, allowing you to create node groups and manage them more conveniently. 

Note: Existing tokens will remain valid, and all integrations that use them will continue to function normally. However, we recommend that you create new tokens for any new integrations to take advantage of the new functionality.

You can find more detailed information about API tokens in our documentation.

Avatar of authorWallarm team
IMPROVEMENT
2 months ago

Streamline Your API Security Operations with Wallarm's Azure Sentinel Integration

Wallarm is pleased to announce a new native integration of the Wallarm End-to-End API Security solution with Microsoft Azure Sentinel, a powerful combination that delivers advanced security capabilities to safeguard your API. Azure Sentinel is a cloud-based service that collects large volumes of data from various sources, including user data, cloud services, and endpoints to help security teams detect, investigate, and respond to security threats using AI and ML. This integration offers real-time reporting about detected malicious requests, vulnerabilities, changes in security settings and other important events. All of this allows security teams to respond promptly and effectively to potential threats.

The integration of Wallarm with Microsoft Azure Sentinel provides a comprehensive and holistic approach to API security. By having all relevant events in one place, security teams gain deep visibility into their API landscape, enabling analysts to detect, investigate, and respond to threats proactively, reducing the risk of data breaches and other security incidents. 

At Wallarm, we understand the importance of protecting your APIs from potential threats. Our native integration with Microsoft Azure Sentinel provides security teams with a comprehensive view of their API landscape. Take advantage of this powerful combination for best-in-class API security today.

You can find more detailed information on this integration in our documentation.

Avatar of authorWallarm team
API SecurityIMPROVEMENT
3 months ago

Introducing the Wallarm API Discovery Dashboard

We are thrilled to announce the release of the new API Discovery Dashboard. With this update, you can now more easily monitor sensitive data, track API changes, and identify risky endpoints.

Key new features of the API Discovery Dashboard to materially reduce your risk exposure include:

  • Monitoring Sensitive Data. Get more in-depth insights into what kinds and how much sensitive data are sent in requests to applications and if there are any extra data that shouldn't be there.
  • Tracking API Changes. Get better visibility into any unexpected or undocumented changes in your APIs across your entire portfolio.
  • Identifying Risk Endpoints. Get a greater understanding of your API attack surface with customizable risk scoring to bring the most risky and most attacked endpoints to your immediate attention.

There are many other capabilities offered by the API Discovery module that can improve your API security. For instance, Security analysts and Security DevOps can receive notifications in Slack, SIEMs, SOARs, etc. about changes that occur in their APIs, so they can stay up-to-date and take action right away.

We are sure that the new API Discovery Dashboard and other important capabilities in the API Discovery module make it easier for you to monitor and secure your APIs.

You can find more information about these capabilities in our documentation.

Avatar of authorWallarm team
IMPROVEMENT
3 months ago

SSRF Mitigation for mission critical APIs with Wallarm last update

Wallarm End-to-End API Security has taken another step forward in reducing organizational risk by improving our Server-side Request Forgery (SSRF) mitigation capabilities. With the rise of SSRF attacks, it's essential to stay ahead of potential security breaches and protect valuable assets. Wallarm's advanced features offer peace of mind and protection against these dangerous attack vectors.

SSRF attacks allow attackers to manipulate a server to make arbitrary requests, often to internal resources, resulting in access to sensitive information, execution of malicious code, and overall compromise of the system's security. As part of the OWASP Top 10 2021, SSRF attacks can bypass network security measures, making them difficult to detect and prevent. 

Recently, SSRF attacks have been a growing concern for businesses globally, with over 100,000 businesses being impacted since November 2022. Some well-known organizations that have fallen victim to SSRF include Azure services, Atlassian, and Exchange. One real-world example of an SSRF attack was on Azure services, where vulnerabilities were found that exposed internal endpoints and sensitive data. Another example is the Exchange zero-day vulnerabilities (CVE-2022-41040 and CVE-2022-41082), where SSRF was used to gain unauthorized access to internal systems.

Wallarm has improved our SSRF mitigation capabilities through a detailed analysis of the most widespread vulnerabilities and attacks. The improvements include enhanced validation of user-supplied URLs and attribution of SSRF attacks to specific vulnerabilities. By providing increased security against SSRF attacks, Wallarm helps businesses maintain the trust of their customers and protect against financial, reputational, and regulatory harms.

To take advantage of our improved SSRF mitigation capabilities, upgrade to the latest version of Wallarm Node (version 4.4.3 or higher). For more information, see the Wallarm documentation.

Avatar of authorWallarm team
IMPROVEMENT
5 months ago

Customization of endpoint risk score calculation

We’ve improved the endpoint risk score feature in the Wallarm API Discovery module. Now you can set the rules for calculating the score for yourself. You can include and exclude risk factors from the calculation, change their weights and change the calculation formula.

The Wallarm security research team has created default calculation rules based on our extensive experience in Cyber Security. You can now modify these calculations based on your specific needs. For example, you can add more weight to the presence of sensitive data or open vulnerabilities.

See our documentation for more details.

Avatar of authorWallarm team