WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team. The...
Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability

Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability

Palo Alto Networks has issued an urgent warning about a potential critical remote code execution (RCE) vulnerability affecting the management interface of their PAN-OS next-generation firewalls. The cybersecurity company has advised customers to take...
Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall Devices

Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall

NCSC researchers have uncovered a sophisticated backdoor dubbed "Pygmy Goat" that was deployed on compromised Sophos XG firewall devices. The malware, discovered by the National Cyber Security Centre (NCSC), provides attackers with persistent access and...
Firewall as a Service

What is Firewall-as-a-Service (FWaaS)? How Does It Work?

A firewall serves as a barrier to unapproved network traffic.  Additional organizational security policies are enforced to achieve this, including active traffic monitoring of incoming and outgoing traffic.  Firewalls were initially implemented internally to safeguard...
Best FWaaS Providers

10 Best Firewall as a Service (FWaaS) Providers – 2024

Firewall as a Service (FWaaS) is an emerging security model in cloud computing and network security. It represents a shift from traditional, on-premise firewall solutions to cloud-based firewall services. Firewalls as Service Providers (FWaaS) are...
What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?

What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?

One of the most important security tools for Linux is the firewall, which controls incoming and outgoing network traffic according to established security policies and prevents unauthorized users from accessing the system. One popular...
178,000 Sonicwall Firewalls are Vulnerable to Exploit in Wild

178,000+ Publicly Exposed Sonicwall Firewalls Vulnerable to RCE Attacks

Due to Sonicwall Firewalls' widespread usage in organizations, hackers find them to be appealing targets when looking to breach networks. By taking advantage of security holes in Sonicwall Firewalls, malicious users can get unwanted access...
Palo Alto Networks to Acquire Cloud Security Start-up Dig

Palo Alto Networks to Acquire Cloud Security Start-up Dig

One of the top companies in the cybersecurity industry, Palo Alto Networks, has recently finalized the acquisition of Dig Security, an up-and-coming startup that specializes in providing advanced security solutions for cloud-based systems. Palo Alto...
Web Security Gateway: Best Security Practices to Protect Enterprise Users?

Web Security Gateway: Best Security Practices to Protect Enterprise Users

Protecting employees from harmful content was a far more straightforward task once upon a time. COVID-19 changed all of that in an instant. The new hybrid work model has forced IT professionals to rethink...
Zyxel Firewall Vulnerability

Zyxel Firewall Vulnerability lets Attackers Inject OS Commands

Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected systems. This RCE vulnerability, tracked as "CVE-2023-28771," was discovered by TRAPA...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...