Knowledge Base | Security

Bot Protection with HAProxy

Bot Protection with HAProxy

HAProxy is a high-performance load balancer that provides advanced defense capabilities for detecting and protecting against malicious bot traffic to your website. Combining its unique ACL, map, and stick table systems with its powerful configuration language allows...

Application-Layer DDoS Attack Protection with HAProxy

Application-Layer DDoS Attack Protection with HAProxy

HAProxy’s high-performance security capabilities are utilized as a key line of defense by many of the world’s top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application with requests or connections, and in this post we will show you how...

HAProxy and SSLv3 Poodle Vulnerability

HAProxy and SSLv3 Poodle Vulnerability

SSLv3 poodle vulnerability Yesterday, Google security researchers have disclosed a new vulnerability on SSL protocol. Fortunately, this vulnerability is only on an old version of the SSL protocol: SSLv3 (15 years old protocol). An attacker can force a browser to...

Mitigating the Shellshock Vulnerability with HAProxy

Mitigating the Shellshock Vulnerability with HAProxy

Bash Shellshock vulnerability (CVE-2014-6271 and CVE-2014-7169) Last week, a vulnerability in bash has been discovered. It is possible, under some circumstances, to inject code into a bash shell script. It could be very dangerous if bash is used to process request...

Apache Cdorked Backdoor Detection

Apache Cdorked Backdoor Detection

Apache Cdorked.A backdoor This is a pretty recent attack, using Cpanel to change the Apache httpd binary by a compromised one which embeds a backdoor. A few articles with more details are available here: *...

WordPress CMS Brute Force Protection with HAProxy

WordPress CMS Brute Force Protection with HAProxy

Brute force attacks Brute force is a pretty simple type of attacks: it consists of massively send requests to a URL with different parameter each time. The main purpose is to try to find the right parameter combination. Usually, brute force is used to discover...

HAProxy Enterprise Edition

A powerful product tailored to your enterprise goals, requirements, and infrastructure.

Request your trial today

Stay informed, subscribe to our blog:

Latest Tweets





+1 (844) 222-4340
contact@haproxy.com

Connect With Us