Solutions
 

Application Security

Cyberattack and cybersecurity terms related to application security

WebSocket Hijacking

WebSockets simplify the communication between browsers and servers by overcoming some of the traditional restrictions.


What Are Web Application Firewall (WAF) Rules?

Web application firewall (WAF) rules are used to define how to inspect HTTP/HTTPS web traffic (requests) to an application, where and what parameters and conditions to look for in the request, and what action the WAF should take when a request matches those definitions.


What Is A Positive Security Model?

A positive security model is one that defines what is allowed and rejects everything else. It is in contrast to a negative security model that defines what is disallowed, while implicitly allowing everything else.


What Is A WAF? 2025 Guide to Web Application Firewalls

A Web Application Firewall is a security tool that protects web applications and APIs from malicious requests and cyber attacks. WAFs are a critical defense for enterprises and online businesses that need to protect sensitive data. WAFs work by analyzing each HTTP/S request and blocking or filtering out any malicious requests. WAFs can also help with load balancing and provide visibility into web traffic.


What is Cross-Site Tracing (XST)?

In the realm of web security, Cross-Site Tracing (XST) constitutes a potent yet often overlooked vulnerability that can compromise the confidentiality of sensitive data.


What is Magecart?

Magecart is a notorious and insidious threat that targets e-commerce websites with the aim of stealing payment card information from unsuspecting customers.


Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia