Network Security

Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots

Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots 2025-03-25 at 17:33 By Eduard Kovacs DrayTek routers around the world are rebooting and the vendor’s statement suggests that it may involve the exploitation of a vulnerability. The post Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots appeared first on SecurityWeek. This article is an excerpt from […]

React to this headline:

Loading spinner

Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots Read More »

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US 2025-03-24 at 14:31 By Eduard Kovacs The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US. The post FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US appeared first on SecurityWeek. This

React to this headline:

Loading spinner

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US Read More »

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum 2025-03-17 at 20:29 By Ryan Naraine Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum Read More »

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers 2025-03-12 at 18:45 By Ryan Naraine China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers. The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers Read More »

Hackers Take Credit for X Cyberattack

Hackers Take Credit for X Cyberattack 2025-03-11 at 13:38 By Eduard Kovacs Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt. The post Hackers Take Credit for X Cyberattack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Hackers Take Credit for X Cyberattack Read More »

Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down

Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down 2025-03-11 at 01:55 By Associated Press Elon Musk claimed that the social media platform X was being targeted in a “massive cyberattack” that impacted availability. The post Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down appeared first

React to this headline:

Loading spinner

Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down Read More »

Skybox Security Shuts Down, Lays off Entire Workforce 

Skybox Security Shuts Down, Lays off Entire Workforce  2025-02-25 at 18:09 By SecurityWeek News The sudden shutdown follows the sale of Skybox Security’s business and technology assets to rival Israeli cybersecurity firm Tufin.  The post Skybox Security Shuts Down, Lays off Entire Workforce  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Skybox Security Shuts Down, Lays off Entire Workforce  Read More »

Five Eyes Agencies Release Guidance on Securing Edge Devices

Five Eyes Agencies Release Guidance on Securing Edge Devices 2025-02-06 at 14:31 By Ionut Arghire Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats. The post Five Eyes Agencies Release Guidance on Securing Edge Devices appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Five Eyes Agencies Release Guidance on Securing Edge Devices Read More »

Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise

Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise 2025-01-30 at 22:34 By Associated Press The lawsuit said that the combination of businesses would eliminate competition, raise prices and reduce innovation. The post Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise Read More »

Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps

Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps 2024-10-02 at 15:46 By Eduard Kovacs Cloudflare recently mitigated another record-breaking DDoS attack, peaking at 3.8 Tbps and 2.14 billion Pps.  The post Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps Read More »

Dragos Acquires Network Perception to Boost Visibility

Dragos Acquires Network Perception to Boost Visibility 2024-10-01 at 16:01 By Eduard Kovacs OT security firm Dragos has acquired Network Perception to enhance its platform’s visibility, segmentation and compliance capabilities.  The post Dragos Acquires Network Perception to Boost Visibility appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Dragos Acquires Network Perception to Boost Visibility Read More »

SecurityWeek to Host 2024 Attack Surface Management Summit on Wednesday

SecurityWeek to Host 2024 Attack Surface Management Summit on Wednesday 2024-09-16 at 20:31 By SecurityWeek News SecurityWeek will host its 2024 Attack Surface Management Summit as a fully immersive virtual event on Wednesday, September 18th. The post SecurityWeek to Host 2024 Attack Surface Management Summit on Wednesday appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

SecurityWeek to Host 2024 Attack Surface Management Summit on Wednesday Read More »

Evasion Tactics Used By Cybercriminals To Fly Under The Radar

Evasion Tactics Used By Cybercriminals To Fly Under The Radar 2024-09-12 at 16:46 By Etay Maor Relentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics Used By Cybercriminals To Fly Under The Radar appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Evasion Tactics Used By Cybercriminals To Fly Under The Radar Read More »

DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign 

DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign  2024-09-05 at 14:16 By Eduard Kovacs Two DrayTek vulnerabilities added by CISA to its KEV catalog have been exploited by multiple threat groups to steal data from organizations worldwide. The post DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign  appeared first

React to this headline:

Loading spinner

DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign  Read More »

China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches

China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches 2024-08-22 at 20:03 By Kevin Townsend Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches

React to this headline:

Loading spinner

China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches Read More »

Reframing the ZTNA vs. SASE Debate

Reframing the ZTNA vs. SASE Debate 2024-08-13 at 17:01 By Etay Maor While ZTNA can be deployed independently, it is an integral component of the SASE architecture as well. The post Reframing the ZTNA vs. SASE Debate appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Reframing the ZTNA vs. SASE Debate Read More »

ZeroTier Raises $13.5 Million in Series A Funding

ZeroTier Raises $13.5 Million in Series A Funding 2024-07-30 at 10:46 By Ionut Arghire Virtual networking provider ZeroTier has raised $13.5 million in a Series A funding round led by Battery Ventures. The post ZeroTier Raises $13.5 Million in Series A Funding appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

ZeroTier Raises $13.5 Million in Series A Funding Read More »

CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities in Network Devices

CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities in Network Devices 2024-07-11 at 14:46 By Ionut Arghire In response to recent intrusions, CISA and the FBI are urging businesses and device manufacturers to eliminate OS command injection vulnerabilities at the source. The post CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities

React to this headline:

Loading spinner

CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities in Network Devices Read More »

Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool

Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool 2024-07-11 at 14:01 By Ionut Arghire Palo Alto Networks patched a critical vulnerability in its Expedition tool and addressed the impact of the recently disclosed BlastRADIUS vulnerability. The post Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool appeared first

React to this headline:

Loading spinner

Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool Read More »

BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol

BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol 2024-07-09 at 20:22 By Ryan Naraine Security vendor InkBridge Networks calls urgent attention to the discovery of a decades-old design flaw (CVE-2024-3596) in the popular RADIUS protocol. The post BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol Read More »

Scroll to Top