Remove Architecture Remove Authentication Remove Firewall Remove Hacking
article thumbnail

Multiple Brocade SANnav SAN Management SW flaws allow device compromise

Security Affairs

” Pierluigi Paganini Follow me on Twitter: @securityaffairs and Facebook and Mastodon ( SecurityAffairs – hacking, Brocade) Multiple vulnerabilities found in the Brocade SANnav storage area network (SAN) management application could potentially compromise affected appliances. These switches are running Linux and are powerful.

Firewall 107
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Password Security: Investigate different password security techniques, such as password hashing algorithms, two-factor authentication (2FA), and biometric authentication. Research network security mechanisms, such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New GTPDOOR backdoor is designed to target telecom carrier networks

Security Affairs

The cybersecurity firm added that the threat actors show an in-depth knowledge of telecommunication network architectures. GTPDOOR also supports authentication and encryption mechanisms. An intriguing aspect of GTPDOOR is its minimal impact on ingress firewall configurations.

article thumbnail

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

The Last Watchdog

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. TLS functions as the confidentiality and authenticity cornerstone of digital commerce.

article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

US CISA and NSA released new guidance that provides recommendations on how to harden Kubernetes deployments and minimize the risk of hack. Use firewalls to limit unneeded network connectivity and encryption to protect confidentiality. SecurityAffairs – hacking, LockBit 2.0). ” states the guidance. Pierluigi Paganini.

article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

China-linked cyberespionage group LightBasin hacked mobile telephone networks around the world and used specialized tools to access calling records. ” The hacking group initially compromised one of the telecommunication companies by leveraging external DNS (eDNS) servers which are part of the General Packet Radio Service (GPRS) network.

article thumbnail

Security Affairs newsletter Round 417 by Pierluigi Paganini – International edition

Security Affairs

ViperSoftX uses more sophisticated encryption and anti-analysis techniques Atomic macOS Stealer is advertised on Telegram for $1,000 per month CISA warns of a critical flaw affecting Illumina medical devices OpenAI reinstates ChatGPT service in Italy after meeting Garante Privacy’s demands Cisco discloses a bug in the Prime Collaboration Deployment (..)