Threat IntelHIGH

Request Smuggling: A Growing Threat to AppSec Leadership

Featured image for Request Smuggling: A Growing Threat to AppSec Leadership
PSPortSwigger Blog
request smugglingAppSecBlack HatDEFCONPortSwigger
🎯

Basically, request smuggling is a sneaky way hackers trick web servers to gain access to sensitive data.

Quick Summary

At Black Hat USA and DEFCON 2025, experts warned that request smuggling is evolving. This growing threat could expose your sensitive data. Organizations must act now to enhance their web security measures.

What Happened

At the recent Black Hat USA and DEFCON 2025 conferences, James Kettle, Director of Research at PortSwigger, delivered a compelling message about the state of web security. He warned that request smuggling?, a technique used by hackers to manipulate web requests, is not disappearing; instead, it is evolving and becoming more sophisticated. This alarming trend poses significant risks to application security (AppSec?) teams and the organizations they protect.

Kettle explained that despite years of efforts to defend against request smuggling? attacks, they continue to thrive. These attacks exploit the way web servers process requests, allowing attackers to sneak malicious requests past security measures. As web technologies evolve, so do the tactics used by cybercriminals, making it crucial for security professionals to stay ahead of the curve.

Why Should You Care

You might be wondering how this affects you. If you use the internet for anything — shopping, banking, or even just browsing — you are at risk. Request smuggling can lead to data breaches, exposing your personal information and financial details. Imagine a thief sneaking into a store through a back door while everyone is distracted at the front; that’s what request smuggling? does to web applications.

For businesses, the stakes are even higher. A successful request smuggling? attack could lead to significant financial losses, reputational damage, and legal consequences. If your company relies on web applications, you need to be aware of this evolving threat and take action to protect your assets.

The key takeaway is simple: stay informed and proactive about web security. Ignoring these threats could leave you vulnerable to attacks that could have devastating consequences.

What's Being Done

In response to this growing threat, security experts, including Kettle, are calling for a renewed focus on application security practices. Organizations are encouraged to adopt a multi-layered security approach that includes regular security assessments, code reviews, and employee training. Here are some immediate actions you can take:

  • Implement Web Application Firewalls (WAFs) to help filter out malicious requests.
  • Regularly review and update your application code to patch vulnerabilities?.
  • Educate your team about the latest security threats and best practices.

Experts are closely monitoring the evolution of request smuggling? techniques and their impact on web security. As the landscape changes, staying informed and adapting your security strategies will be essential to fend off these attacks.

💡 Tap dotted terms for explanations

🔒 Pro insight: The resurgence of request smuggling highlights the need for continuous adaptation in AppSec strategies to counteract evolving attack vectors.

Original article from

PortSwigger Blog

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - AiTM Phishing Kit Hijacks AWS Accounts

Hackers are using an AiTM phishing kit to hijack AWS accounts. Meanwhile, a year-long malware campaign is targeting HR departments, posing serious risks to sensitive data. Organizations must act swiftly to bolster their defenses.

Help Net Security·
HIGHThreat Intel

Storm-2561 Campaign Targets Users with Fake VPN Sites

Storm-2561 is tricking users into downloading fake VPN software. This affects anyone searching for trusted VPN clients. The risk includes stolen corporate credentials and potential data breaches. Stay vigilant and verify software sources.

Security Affairs·
HIGHThreat Intel

Operation Synergia III: 45,000 Malicious IPs Taken Down Globally

INTERPOL's Operation Synergia III dismantled 45,000 malicious IPs and arrested 94 suspects. This global effort highlights the growing threat of cybercrime. Authorities are committed to ongoing investigations and collaboration to combat these issues.

Security Affairs·
HIGHThreat Intel

Massive Crackdown on 45,000 Malicious IPs Behind Ransomware

In a historic crackdown, INTERPOL and 72 nations shut down over 45,000 malicious IPs linked to cybercrime. This operation highlights the global effort to combat ransomware and phishing attacks. With numerous arrests and seized servers, authorities are making strides to dismantle cybercriminal networks.

Cyber Security News·
HIGHThreat Intel

AI Phishing Attacks Surge with Malicious SVGs Post-Holiday

AI phishing attacks have surged post-holidays, with a 50-fold increase in malicious SVGs. Many users are affected as attackers impersonate trusted entities. This evolving threat highlights the need for enhanced email security measures.

SC Media·
HIGHThreat Intel

Europol Shuts Down Major Phishing Platform: Tycoon 2FA

Europol and vendors have taken down the Tycoon 2FA phishing platform. This operation disrupts a major threat to users. Stay alert and protect your data from phishing scams.

Proofpoint Threat Insight·