article thumbnail

Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits

eSecurity Planet

Threats range from severe weaknesses in Ivanti’s VPN appliances to zero-day exploits in popular software such as Palo Alto Networks’ PAN-OS and Telegram’s Windows client. Typically, these vulnerabilities result in remote code execution or denial-of-service attacks, posing major dangers to users’ data security.

Firewall 107
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Unpatched devices can give attackers privileged access to networks, particularly those set up as VPN virtual servers, ICA proxies, RDP proxies, or AAA servers. It is suspected that the Akira ransomware organization used an undisclosed weakness in Cisco VPN software to evade authentication. MFA should be enabled for all VPN users.

VPN 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday Targets 74 Flaws, Including Microsoft Teams, Office

eSecurity Planet

. “Patch Tuesday watchers will be familiar with Microsoft’s clarification that this type of exploit is sometimes referred to as arbitrary code execution (ACE) since the attack is local – a malicious document opened on the asset – even if the attacker is remote,” he wrote. score is 7.5, Read next: What is Patch Management?

VPN 98
article thumbnail

What Is an Application Level Gateway? How ALGs Work

eSecurity Planet

To help you visualize the process better, we’ve also provided screenshots from Microsoft Azure’s application gateway documentation. ALGs optimize network performance and security by controlling application access while also allowing for more efficient resource utilization.

Firewall 103
article thumbnail

Cato SASE Cloud Review & Features 2023

eSecurity Planet

Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Email Address By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy.

article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

Deploy the firewalls across all endpoints, configure default rules, create specific application rules, enforce the principle of least privilege, test and document rule changes, and employ endpoint protection solutions. Verify documentation and support for a smooth deployment and ongoing operations.

Firewall 107
article thumbnail

How To Set Up a Firewall in 8 Easy Steps + Best Practices

eSecurity Planet

Gather the necessary equipment, evaluate the network layout, and become familiar with the firewall documentation. Sample firewall rule administration from ManageEngine Need help in creating a firewall policy document? Changes should be documented and audit information stored for regulatory reporting purposes.