Remove Authentication Remove Firewall Remove Presentation Remove VPN
article thumbnail

Zyxel 0day Affects its Firewall Products, Too

Krebs on Security

Today, Zyxel acknowledged the same flaw is present in many of its firewall products. “We’ve now completed the investigation of all Zyxel products and found that firewall products running specific firmware versions are also vulnerable,” Zyxel wrote in an email to KrebsOnSecurity. Patch 0 through ZLD V4.35

Firewall 257
article thumbnail

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

By redirecting the pointer to the Line Dancer interpreter, attackers can interact with the device through POST requests without authentication. Additionally, Line Dancer hooks into the crash dump and AAA processes to evade forensic analysis and establish remote access VPN tunnels. reads a post published by Crowdstrike on Reddit.

VPN 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Announcing General Availability of Server Message Block Protocol Support for Duo Network Gateway

Duo's Security Blog

This means that the DNG now enables users to access on-premises shares, without requiring a full VPN connection. It also eliminates the need for full VPN and avoids exposing those applications directly to the internet. Then it verifies user identity with advanced multi-factor authentication (MFA). What is Duo Network Gateway?

VPN 101
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Unpatched devices can give attackers privileged access to networks, particularly those set up as VPN virtual servers, ICA proxies, RDP proxies, or AAA servers. It is suspected that the Akira ransomware organization used an undisclosed weakness in Cisco VPN software to evade authentication.

VPN 96
article thumbnail

Managed or Unmanaged Device? Duo’s Device Trust Has You Covered

Duo's Security Blog

And certain VPN clients or remote access agents perform posture checks to enforce device-based access policies. But organizations are moving their applications to the cloud, allowing BYOD and contractor devices for work, and reducing their reliance on VPN for remote access. Administrators can set access policies based on device health.

VPN 75
article thumbnail

Credential-stealing malware disguises itself as Telegram, targets social media users

Malwarebytes

The malware also plans to steal saved VPN/dial up credentials from the AppdataMicrosoftNetworkConnectionsPbkrasphone.pbk and Pbkrasphone.pbk phonebooks if present. First, the malware checks whether it is able to authenticate using the stolen cookies. cn/eg/fr/de/in/it/co.jp/nl/pl/sa/sg/es/se/ae/co.uk/com/com.au/com.br/mx/tr

Media 127
article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

Within an office environment, workers have a number of protections, such as the company firewall and regularly updated infrastructure. Invest in a strong VPN. A VPN can provide access to a remote company server, as well as other systems, tools, and software. Without these protections, remote staff can potentially be vulnerable.