Remove Cybersecurity Remove Firewall Remove Security Defenses Remove VPN
article thumbnail

VulnRecap 1/16/24 – Major Firewall Issues Persist

eSecurity Planet

Keep an eye out for security announcements from your firewall vendors; it’s possible additional similar vulnerabilities will come to light. The problem: Juniper Networks released a bulletin about a remote code execution vulnerability in its SRX firewalls and EX switches. This vulnerability is tracked as CVE-2024-21591.

article thumbnail

How To Set Up a Firewall in 8 Easy Steps + Best Practices

eSecurity Planet

Setting up a firewall is the first step in securing your network. A successful firewall setup and deployment requires careful design, implementation, and maintenance to effectively improve your network integrity and data security. Verify that the chosen firewall can meet your security standards and functions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits

eSecurity Planet

Last week’s cybersecurity incidents revealed significant vulnerabilities across multiple platforms. Threats range from severe weaknesses in Ivanti’s VPN appliances to zero-day exploits in popular software such as Palo Alto Networks’ PAN-OS and Telegram’s Windows client.

article thumbnail

Blister malware using code signing certificates to evade anti malware detection

CyberSecurity Insiders

As some hackers have developed a malware that uses code signing certificates to avoid detection by security defenses and has the tendency to download payloads onto a compromised system. Interestingly, the malware is found using a code signing certificate from Sectigo, a cybersecurity company that offers digital identity solutions.

Malware 124
article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

Unmanaged devices consist of any device that connects to the network, cloud resources, or other assets without corporate-controlled security. Remote encryption performs ransomware encryption on a device beyond the security solutions monitoring for malicious activity.

article thumbnail

VulnRecap 2/12/24: Ivanti, JetBrains, Fortinet, Linux Issues

eSecurity Planet

February 8, 2024 FortiOS Sees Critical Vulnerability in SSL VPN Functionality Type of vulnerability: Arbitrary code execution by an unauthenticated user. The problem: Fortinet disclosed a vulnerability in its SSL VPN feature within FortiOS, the operating system that manages its next-generation firewall products. versions 7.4.0

VPN 104
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Major cybersecurity events in the last week make clear that hackers just keep getting savvier — and security teams need to be vigilant to keep up. Citrix, Juniper, VMware and Cisco are just a few of the IT vendors whose products made news for security vulnerabilities in the last week. out of 10 on the CVSS vulnerability scale.

VPN 96