AZ-EDGIO
Edgio (NASDAQ: EGIO), the platform of choice for speed, security, and simplicity at the edge, found that web application attacks continued to increase and evolve in the fourth quarter of 2023, as reported in its new Edgio Quarterly Attack Trends Report in which the company analyzed 5.2 billion attack requests. Edgio found that the most prevalent attack mitigated was path traversal. A successful path traversal attack allows a threat actor to access files on a web server, and has surpassed the prior #1 threat, SQL injection, a common attack vector that often uses malicious SQL statements to attempt to exfiltrate sensitive data from databases behind applications.
Edgio’s report explains how path traversal attacks can lead to deep system intrusions posing a significant threat to an organization’s infrastructure and the confidentiality, integrity, and availability of data delivered over the Internet. These attacks can result in unauthorized access to content, the loss of personally identifiable information (PII), the dissemination of private/copyrighted information, or even remote code execution. Unmitigated attacks can lead to even more serious consequences, such as the deployment of ransomware or other malicious software.
“As one of the leading edge-computing providers, Edgio has unparalleled visibility into the threats facing web applications today,” said Tom Gorup, Vice President of Security for Edgio. “We are assembling our knowledge and expertise into a quarterly read-out to enable enterprises to better protect their web infrastructure and applications. As more businesses become dependent on their digital assets, it’s critical this knowledge is shared to build a safer Internet.”
The report looked at malicious requests and the different types of blocking, categorizing protection into three categories: access control rules, managed rulesets, and custom signatures. Of those that were focused on access controls, over 76% of mitigated requests were based on IP, user-agent, and country matches, highlighting just how much bad traffic can be eliminated with basic blocklisting tactics. With managed rulesets, Edgio saw a wide range of threat types blocked, with path traversal, SQL injection and cross-site scripting (XSS) attacks leading the way when it comes to OWASP attacks.
In addition, Edgio was able to review web application firewall (WAF) request denials by country of origin, while noting that attackers often leverage local resources to launch attacks in order to evade geofencing tactics. This could explain why attacks coordinated from advanced threat actors in more prominent countries did not crack Edgio’s Top 10 for the quarter.
Top countries by malicious request origin, making up nearly 62% of all requests denied, include:
- United States – 26.3%
- France – 17.4%
- Germany – 9.4%
- Russia – 8.8%
Edgio found that WAF customers used access control features to allow or deny specific request methods, using their knowledge of their own applications to inform their security controls and lower risk. The report indicates that attackers frequently leverage request methods like HEAD that return app and infrastructure information that can be used by the attacker for reconnaissance purposes and to craft a malicious payload.
Based on deep parsing of attack payloads, Edgio found that 98% of all malicious payloads fell into JavaScript Object Notation (JSON) and URL encoded form categories (used for storing and transporting data) but cautioned security teams to remain vigilant as attackers evolve in their selection of payload content types.
Best practices for digital asset protection: proactively stop threats against websites and applications
Based on its findings, Edgio recommends the following methods to best protect digital assets, including websites and applications:
- Ensure your WAF provides a layered defense to protect organizations against the known bad, application-specific, and emerging threats. A complete solution will show a distribution of enforcement across access control rules, managed rulesets, and custom signatures.
- Blocklists are still an effective and low-cost part of a layered security approach to safeguard Internet-facing assets. Organizations should also take advantage of threat intelligence feeds to further harden their security posture against known bad actors.
- While managed rules are often maintained and updated by your WAF provider, it is not advisable to use a ‘set it and forget’ approach. As an application evolves and new functionalities are developed, policy reviews and analysis of managed ruleset enforcement is recommended. It is best to ensure rules are closely aligned with business application needs.
- Organizations should take the time to understand where they are doing business and where they aren’t allowed to do business. Block the countries or sub-regions that bring no value to a brand to reduce their attack surface. Blocking embargoed countries is a great starting point, but don’t rely on this approach as a catch all for bad actors.
- Know the application and use this knowledge to inform security solutions, like a WAF, to limit the application request methods or content types based on application needs.
To obtain a full copy of the report, click here.
About Edgio
Edgio (NASDAQCM: EGIO) helps companies deliver online experiences and content faster, safer and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrated application and media solutions, provides a single platform for delivering high-performing, secure web properties and streaming content. Companies can deliver content quicker and more securely through this fully integrated platform and end-to-end edge services, boosting overall revenue and business value. To learn more, visit edg.io and follow us on Twitter, LinkedIn and Facebook.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20240222674952/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Andersen Consulting tilføjer samarbejdspartneren Cloud2321.11.2025 18:45:00 CET | Pressemeddelelse
Andersen Consulting indgår en samarbejdsaftale med Cloud23, en næstegenerations konsulentvirksomhed, der integrerer data og kunstig intelligens med henblik på at drive digital transformation. Cloud23 er baseret i Sydafrika og leverer intelligente, platformsbaserede løsninger til kunder inden for sektorer som finans, telekommunikation, sundhedsvæsen og produktion. Virksomhedens ydelser spænder over Salesforce-rådgivning og -implementering, managed services og ai-strategi, hvilket giver organisationer mulighed for at modernisere kundeengagement, optimere driften og skabe målbare resultater. “Vores mål hos Cloud23 har altid været at forenkle transformation gennem smart, skalerbart design,” udtaler Ram Ramakrishnan, stifter og administrerende direktør for Cloud23. “Vi fokuserer på at afstemme teknologi med formål og levere resultater, der understøtter langsigtet vækst, kundeværdi og innovation. Samarbejdet med Andersen Consulting giver os mulighed for at styrke vores mission og opnå en stø
AI Takes Out the Trash: Largest U.S. Recycling Project to Extend Landfill Life for Virginia Residents21.11.2025 13:30:00 CET | Press release
Southeastern Public Service Authority of Virginia contracts with AMP to cost-effectively process municipal solid waste, boost recycling and landfill diversion rates The Southeastern Public Service Authority of Virginia (“SPSA”), the regional waste authority for South Hampton Roads, has signed a 20-year contract with Commonwealth Sortation LLC, an affiliate of AMP Robotics Corporation (together, “AMP”), to provide solid waste processing services for SPSA’s eight member communities and their 1.2 million residents. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251120330758/en/ Building on a nearly two-year pilot project in Portsmouth—which featured an AMP ONE™ system capable of processing up to 150 tons of locally sourced municipal solid waste (“MSW”) per day—AMP will now scale its technology region-wide. Under this long-term partnership, which will facilitate the largest recycling project in the country, AMP will deploy addit
RSA Recognized for the Second Consecutive Year in the 2025 Gartner® Magic Quadrant™ for Access Management21.11.2025 13:00:00 CET | Press release
RSA, the security-first identity leader, today announced that RSA® ID Plus has been recognized for the second year in a row in the Gartner® Magic Quadrant™ for Access Management. “The RSA Access Management strategy has never been about being everything to everyone,” said Greg Nelson, RSA CEO. “We specialize in protecting organizations where risk tolerance is at its lowest and security requirements are at their highest. Our focus is intentional: providing security-first access management that supports compliance, ensures resilience, and delivers confidence at scale.” “RSA specializes in the workforce access management use cases where security, compliance, and operational resilience are non-negotiables,” said Jim Taylor, RSA President, Chief Product and Strategy Officer. “Our product development strategy will continue to emphasize the key qualities that highly regulated industries prioritize, including user experience, strong support for workforce management, and intelligent posture mana
NIQ and Amazon Marketing Cloud (AMC) Collaborate to Measure Reach and Impact of Cross-Platform Ad Campaigns in Italy21.11.2025 09:00:00 CET | Press release
NIQ and Amazon Marketing Cloud (AMC) have announced a new collaboration to study the effectiveness of cross-platform advertising across linear TV and Amazon Ads inventory in Italy. Through the collaboration advertisers and agencies will gain actionable insights into the relative performance of ad placements across digital, linear TV and streaming environments, including how each contributes to incremental reach and influences product purchases on Amazon’s ecommerce platforms. The insights are made possible by using high-quality data from Sinottica®—a well-established single-source consumer panel in Italy owned by NIQ—with data from Amazon Marketing Cloud. Specifically, the research will leverage Sinottica’s linear TV data alongside several Amazon inventory sources, including Amazon DSP, Sponsored Ads (Products, Brands, Display), and Streaming TV (Prime Video, Twitch, Fire TV). This approach will enable a deeper understanding of how ad exposure across digital and TV channels translates
Ahead of Holiday Season, Visa Identifies Five Transformative Forces Reshaping Global Payment Security20.11.2025 19:50:00 CET | Press release
New Biannual Threats Report Reveals Fundamental Shift in Fraud Operations as Criminals Adopt Industrial-Scale Tactics To celebrate International Fraud Awareness Week, Visa (NYSE: V) today released its Fall 2025 Biannual Threats Report, revealing five forces that are transforming the global payments security landscape. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251120412198/en/ The report, produced by Visa's Payment Ecosystem Risk and Control (PERC) team, draws on intelligence from Visa's global network to identify how criminal operations are evolving with unprecedented speed, scale, and sophistication. "The payments ecosystem is experiencing a paradigm shift in how fraud operates," said Paul Fabara, Chief Risk and Client Services Officer at Visa. "Criminals are no longer working as opportunistic individuals-- they're operating like tech startups, building reusable infrastructure and deploying systematic, industrial-scale
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
