Simran Khalsa
Staff Security Researcher
Simran is a Staff Security Researcher at Fastly where he focuses on threat intelligence, vulnerability research, and product innovation. He enjoys researching novel attack techniques and fortifying technology to prevent real-world web attacks. He has spent his career on both the offensive and defensive sides of the industry in both public and private sectors with an emphasis on building modern security solutions.
Automating and Defending Nefarious Automation
Fastly Security Research Team, Simran Khalsa
If your application is on the internet, chances are it has been subjected to nefarious automation. These events can include many different attacks – including content scraping, credential stuffing, application DDoS, web form abuse, token guessing, and more.
Spring: CVE-2022-22963 & Spring4Shell (CVE-2022-22965) | Fastly
Fastly Security Research Team, Xavier Stevens, 1 de plus
In this post, we review details for two RCE vulnerabilities impacting Spring Cloud and Spring Framework, including how Fastly customers can protect themselves from this vulnerability.
How to Secure your GraphQL
Fastly Security Research Team, Simran Khalsa
There are many benefits to adopting GraphQL, but its security implications are less understood. In this post, we’ll explore those implications and offer guidance on which defaults and controls can support a safer GraphQL implementation.
WAF framework measures WAF effectiveness | Fastly
Fastly Security Research Team, Simran Khalsa, 1 de plus
Our new WAF efficacy framework provides a standardized way to measure the effectiveness of a WAF’s detection capabilities through continuous verification and validation. Here’s how it works.
Log4Shell attacks (CVE-2021-44228) insights | Fastly
Fastly Security Research Team, Xavier Stevens, 1 de plus
We’re sharing our latest data and new insights into the Log4j/Log4Shell vulnerability (CVE-2021-44228 + CVE-2021-45046) in this post in order to help the engineering community cope with the situation. We also share our guidance around testing your environment against many of the new obfuscation methods that have been seen.
Log4Shell exploit found in Log4j | Fastly
Fastly Security Research Team, Xavier Stevens, 1 de plus
CVE-2021-44228 is a Remote Code Execution vulnerability in the Apache Log4j library being actively exploited. We provide our observations into the exploit and a summary of its impact.
Atlassian Confluence OGNL Injection Vulnerability Protection | Fastly
Fastly Security Research Team, Xavier Stevens, 1 de plus
Our Security Research Team has built and deployed a rule to help protect customers of our next-gen WAF against the recently announced Confluence Server OGNL injection vulnerability, CVE-2021-26084.