The Alarming Rise of Ransomware Attacks

The Alarming Rise of Ransomware Attacks

Introduction Ransomware attacks have dramatically increased over the past few years, with severe effects on both individuals and corporations. Cybercriminals now use ransomware, a type of malicious software that encrypts files or ...
Techniques employed by Threat Actors to evade the WAF

Techniques employed by Threat Actors to evade the WAF

Introduction WAF (Web Application Firewalls) is an essential component of any secure network infrastructure. They are designed to protect a network from external threats such as unauthorized access, malware, and other malicious ...
“Top 5 ways hackers can bypass your firewall”

“Top 5 ways hackers can bypass your firewall”

Introduction Every firewall in the market is vulnerable to hacking, despite what certain security providers may assert. Threat actors can still defeat a firewall’s security measures by employing a number of strategies.As ...
Fortinet Warns of New Authentication Bypass Vulnerability

Fortinet Warns of New Authentication Bypass Vulnerability

Note this! A brand-new, significant vulnerability is coming. Fortinet recently discovered an authentication bypass flaw in its FortiOS, FortiProxy, and FortiSwitchManager appliances. Customers of Fortinet who use vulnerable product instances are at ...
Aviatrix firewalls Oracle Firewall Cisco Next-Gen Firewall Sizing

Firewalls and the Plateau of Productivity

Firewalls: Something every architect is familiar with. Something that still raises many of our heart rates. At some point in your IT career, it’s likely you’ve had to deploy and configure a ...
Security Boulevard
application cyberwarfare firewall

Perimeter 81 Looks to Take Firewall Appliances Out

Perimeter 81 has raised an additional $40 million in funding as part of an effort to eliminate the need to rely on firewalls in the form of an appliance to secure perimeters ...
Security Boulevard
ML firewalls

Palo Alto Networks Embeds ML Models in Firewalls

Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time. Anand Oswal, ...
Security Boulevard
Zero-Day Flaw Allowed Attackers to Achieve RCE on Firewalls

Zero-Day Flaw Allowed Attackers to Achieve RCE on Firewalls

British security firm Sophos determined that malicious actors had abused a zero-day vulnerability to achieve remote code execution (RCE) on some of its firewall products. According to Sophos, the attack chain began ...
Webroot

Untangle Extends Security Alliance With Webroot

Untangle has deepened its alliance with Webroot to provide tighter integration between the control plane Untangle uses to manage firewalls and the endpoint security software provided by Webroot. Heather Paunet, vice president ...
Security Boulevard
Fortinet SD-WAN

Fortinet Launches Secure Branch Initiative

Fortinet today launched an initiative to integrate firewalls and software-defined wide area networks (SD-WANs) to make it easier to secure a branch office. The Fortinet SD-Branch portfolio consists of the company’s firewall ...
Security Boulevard