Skip to content

Effective Strategies for Handling Http/2 Continuations Using Imperva WAF

Original Post: Mitigate Http/2 continuations with Imperva WAF

The document discusses the increasing threats in the cybersecurity landscape, particularly focusing on HTTP/2 vulnerabilities. Imperva, a security company, details how it has protected its customers from such threats, including the “Rapid Reset” and the newly identified “HTTP/2 CONTINUATION Flood” vulnerabilities. The latter involves attackers sending continuous CONTINUATION frames without setting the END_HEADERS, leading to a Denial-of-Service (DoS) attack that exhausts the server’s resources. Imperva’s Web Application Firewall (WAF) plays a critical role in these defenses by offering real-time detection, threat mitigation, and ensuring comprehensive web application and API protection. Imperva also emphasizes their proactive threat research and 24/7 Security Operations Center (SOC), inviting potential customers to try their cloud WAF through a free trial. Additionally, resources for customer support and further inquiries are provided.

Go here to read the Original Post

Leave a Reply

Your email address will not be published. Required fields are marked *