WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to...
Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability

Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability

Palo Alto Networks has issued an urgent warning about a potential critical remote code execution (RCE) vulnerability affecting the management interface of their PAN-OS...
Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall Devices

Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall

NCSC researchers have uncovered a sophisticated backdoor dubbed "Pygmy Goat" that was deployed on compromised Sophos XG firewall devices. The malware, discovered by the National...
Firewall as a Service

What is Firewall-as-a-Service (FWaaS)? How Does It Work?

A firewall serves as a barrier to unapproved network traffic.  Additional organizational security policies are enforced to achieve this, including active traffic monitoring of...
Best FWaaS Providers

10 Best Firewall as a Service (FWaaS) Providers – 2024

Firewall as a Service (FWaaS) is an emerging security model in cloud computing and network security. It represents a shift from traditional, on-premise firewall...
What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?

What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?

One of the most important security tools for Linux is the firewall, which controls incoming and outgoing network traffic according to established security policies...
178,000 Sonicwall Firewalls are Vulnerable to Exploit in Wild

178,000+ Publicly Exposed Sonicwall Firewalls Vulnerable to RCE Attacks

Due to Sonicwall Firewalls' widespread usage in organizations, hackers find them to be appealing targets when looking to breach networks. By taking advantage of security...
Palo Alto Networks to Acquire Cloud Security Start-up Dig

Palo Alto Networks to Acquire Cloud Security Start-up Dig

One of the top companies in the cybersecurity industry, Palo Alto Networks, has recently finalized the acquisition of Dig Security, an up-and-coming startup that...
Web Security Gateway: Best Security Practices to Protect Enterprise Users?

Web Security Gateway: Best Security Practices to Protect Enterprise Users

Protecting employees from harmful content was a far more straightforward task once upon a time. COVID-19 changed all of that in an instant. The...
Zyxel Firewall Vulnerability

Zyxel Firewall Vulnerability lets Attackers Inject OS Commands

Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...