WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies
A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team.
The...
Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability
Palo Alto Networks has issued an urgent warning about a potential critical remote code execution (RCE) vulnerability affecting the management interface of their PAN-OS next-generation firewalls.
The cybersecurity company has advised customers to take...
Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall
NCSC researchers have uncovered a sophisticated backdoor dubbed "Pygmy Goat" that was deployed on compromised Sophos XG firewall devices.
The malware, discovered by the National Cyber Security Centre (NCSC), provides attackers with persistent access and...
What is Firewall-as-a-Service (FWaaS)? How Does It Work?
A firewall serves as a barrier to unapproved network traffic. Additional organizational security policies are enforced to achieve this, including active traffic monitoring of incoming and outgoing traffic.
Firewalls were initially implemented internally to safeguard...
10 Best Firewall as a Service (FWaaS) Providers – 2024
Firewall as a Service (FWaaS) is an emerging security model in cloud computing and network security. It represents a shift from traditional, on-premise firewall solutions to cloud-based firewall services.
Firewalls as Service Providers (FWaaS) are...
What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?
One of the most important security tools for Linux is the firewall, which controls incoming and outgoing network traffic according to established security policies and prevents unauthorized users from accessing the system.
One popular...
178,000+ Publicly Exposed Sonicwall Firewalls Vulnerable to RCE Attacks
Due to Sonicwall Firewalls' widespread usage in organizations, hackers find them to be appealing targets when looking to breach networks.
By taking advantage of security holes in Sonicwall Firewalls, malicious users can get unwanted access...
Palo Alto Networks to Acquire Cloud Security Start-up Dig
One of the top companies in the cybersecurity industry, Palo Alto Networks, has recently finalized the acquisition of Dig Security, an up-and-coming startup that specializes in providing advanced security solutions for cloud-based systems.
Palo Alto...
Web Security Gateway: Best Security Practices to Protect Enterprise Users
Protecting employees from harmful content was a far more straightforward task once upon a time. COVID-19 changed all of that in an instant. The new hybrid work model has forced IT professionals to rethink...
Zyxel Firewall Vulnerability lets Attackers Inject OS Commands
Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected systems.
This RCE vulnerability, tracked as "CVE-2023-28771," was discovered by TRAPA...