firewalls
The Alarming Rise of Ransomware Attacks
Introduction Ransomware attacks have dramatically increased over the past few years, with severe effects on both individuals and corporations. Cybercriminals now use ransomware, a type of malicious software that encrypts files or ...
Techniques employed by Threat Actors to evade the WAF
Introduction WAF (Web Application Firewalls) is an essential component of any secure network infrastructure. They are designed to protect a network from external threats such as unauthorized access, malware, and other malicious ...
“Top 5 ways hackers can bypass your firewall”
Introduction Every firewall in the market is vulnerable to hacking, despite what certain security providers may assert. Threat actors can still defeat a firewall’s security measures by employing a number of strategies.As ...
Fortinet Warns of New Authentication Bypass Vulnerability
Note this! A brand-new, significant vulnerability is coming. Fortinet recently discovered an authentication bypass flaw in its FortiOS, FortiProxy, and FortiSwitchManager appliances. Customers of Fortinet who use vulnerable product instances are at ...
Firewalls and the Plateau of Productivity
Firewalls: Something every architect is familiar with. Something that still raises many of our heart rates. At some point in your IT career, it’s likely you’ve had to deploy and configure a ...
Perimeter 81 Looks to Take Firewall Appliances Out
Perimeter 81 has raised an additional $40 million in funding as part of an effort to eliminate the need to rely on firewalls in the form of an appliance to secure perimeters ...
Palo Alto Networks Embeds ML Models in Firewalls
Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time. Anand Oswal, ...
Zero-Day Flaw Allowed Attackers to Achieve RCE on Firewalls
British security firm Sophos determined that malicious actors had abused a zero-day vulnerability to achieve remote code execution (RCE) on some of its firewall products. According to Sophos, the attack chain began ...
Untangle Extends Security Alliance With Webroot
Untangle has deepened its alliance with Webroot to provide tighter integration between the control plane Untangle uses to manage firewalls and the endpoint security software provided by Webroot. Heather Paunet, vice president ...
Fortinet Launches Secure Branch Initiative
Fortinet today launched an initiative to integrate firewalls and software-defined wide area networks (SD-WANs) to make it easier to secure a branch office. The Fortinet SD-Branch portfolio consists of the company’s firewall ...