HAProxy is Resilient to the HTTP/2 CONTINUATION Flood
Our implementation of the HTTP/2 protocol can effectively handle the CONTINUATION Flood.
Our implementation of the HTTP/2 protocol can effectively handle the CONTINUATION Flood.
While there are core differences between web apps and APIs, a unified security strategy is crucial. In this blog, we'll discuss why both types of security appear different yet are inherently linked.
CVE-2023-44487 found in the HTTP/2 protocol could allow a DoS attack against web servers, reverse proxies, or other software. HAProxy products are unaffected, but we're monitoring the situation.
HAProxy's high-performance security capabilities are utilized as a key line of defense by many of the world's top enterprises. Application-layer DDoS attacks are aimed at overwhelming an application w
Showing 1 of 1 Pages