Attackers have successfully bypassed the signature-based detection rules in Radware's WAF. This highlights a critical vulnerability in Radware's WAF that allows attackers to evade detection mechanisms. Organizations using Radware's WAF must be aware of this issue and take necessary measures to enhance their security posture.
For more insights, check out the original tweet here: https://twitter.com/apisecurityio/status/1921940620861436115. And don’t forget to follow @apisecurityio for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: