Tag: Blog

Smuggling Requests with Chunked Extensions: A New HTTP Desync Trick

A new HTTP request smuggling technique was recently discovered, where attackers take advantage of inconsistent parsing behaviors between front-end proxy servers and back-end application servers. This attack technique leverages ambiguous request formatting to inject malicious secondary requests that appear after…

Accelerating Secure Enterprise Kubernetes Adoption

Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. This article has been indexed from Blog Read the original article: Accelerating Secure Enterprise Kubernetes Adoption

MadeYouReset: Turning HTTP/2 Server Against Itself

Introduction HTTP/2 was designed for performance- faster multiplexed connections, stream prioritization, and header compression. But these same features have also opened the door for sophisticated denial-of-service attacks. Back in 2023, the HTTP/2 Rapid Reset vulnerability made headlines after attackers exploited…