Network Security

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks 2024-04-11 at 19:46 By Ryan Naraine Zscaler announces plans to acquire Airgap Networks, a venture-backed startup selling network segmentation and secure access technologies. The post Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS […]

React to this headline:

Loading spinner

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks Read More »

Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks

Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks 2024-04-11 at 17:46 By Kevin Townsend SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks. The post Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Inside AWS’s Crusade Against IP Spoofing and DDoS Attacks Read More »

Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability

Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability 2024-04-08 at 18:01 By Ionut Arghire Researchers at the Shadowserver Foundation identify thousands of internet-exposed Ivanti VPN appliances likely impacted by a recently disclosed vulnerability leading to remote code execution. The post Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability Read More »

Cisco Warns of Vulnerability in Discontinued Small Business Routers

Cisco Warns of Vulnerability in Discontinued Small Business Routers 2024-04-05 at 19:02 By Ionut Arghire Cisco says it will not release patches for a cross-site scripting vulnerability impacting end-of-life small business routers. The post Cisco Warns of Vulnerability in Discontinued Small Business Routers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Cisco Warns of Vulnerability in Discontinued Small Business Routers Read More »

New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset

New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset 2024-04-04 at 14:31 By Eduard Kovacs New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks. The post New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset appeared first on

React to this headline:

Loading spinner

New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset Read More »

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed!

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! 2024-04-02 at 14:16 By Kevin Townsend Heartbleed made most certificates vulnerable. The future problem is that quantum decryption will make all certificates and everything else using RSA encryption vulnerable to everyone. The post Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! appeared first

React to this headline:

Loading spinner

Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed! Read More »

Cisco Patches DoS Vulnerabilities in Networking Products

Cisco Patches DoS Vulnerabilities in Networking Products 2024-03-28 at 15:17 By Ionut Arghire Cisco has released patches for multiple IOS and IOS XE software vulnerabilities leading to denial-of-service (DoS). The post Cisco Patches DoS Vulnerabilities in Networking Products appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Cisco Patches DoS Vulnerabilities in Networking Products Read More »

US Government Issues New DDoS Mitigation Guidance

US Government Issues New DDoS Mitigation Guidance 2024-03-22 at 16:01 By Ionut Arghire CISA, the FBI, and MS-ISAC have released new guidance on how federal agencies can defend against DDoS attacks. The post US Government Issues New DDoS Mitigation Guidance appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

US Government Issues New DDoS Mitigation Guidance Read More »

300,000 Systems Vulnerable to New Loop DoS Attack

300,000 Systems Vulnerable to New Loop DoS Attack 2024-03-20 at 12:01 By Eduard Kovacs Academic researchers describe a new application-layer loop DoS attack affecting Broadcom, Honeywell, Microsoft and MikroTik. The post 300,000 Systems Vulnerable to New Loop DoS Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

300,000 Systems Vulnerable to New Loop DoS Attack Read More »

Cisco Releases Open Source Backplane Traffic Visibility Tool for OT 

Cisco Releases Open Source Backplane Traffic Visibility Tool for OT  2024-03-06 at 17:36 By Eduard Kovacs Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT.  The post Cisco Releases Open Source Backplane Traffic Visibility Tool for OT  appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cisco Releases Open Source Backplane Traffic Visibility Tool for OT  Read More »

How Traffic, State, and Organizational Data Help Fortify Your Network

How Traffic, State, and Organizational Data Help Fortify Your Network 2024-03-04 at 15:47 By Matt Wilson Traffic data is the lifeblood of network security, representing the raw, unfiltered truth of what is happening on the network. The post How Traffic, State, and Organizational Data Help Fortify Your Network appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

How Traffic, State, and Organizational Data Help Fortify Your Network Read More »

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams 2024-02-27 at 14:31 By Tom Eston The best Red Team engagements are a balanced mix of technology, tools and human operators. The post Artificial Arms Race: What Can Automation and AI do to Advance Red Teams appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams Read More »

Zyxel Patches Remote Code Execution Bug in Firewall Products

Zyxel Patches Remote Code Execution Bug in Firewall Products 2024-02-26 at 19:17 By Ryan Naraine Taiwanese networking vendor Zyxel confirms security flaws in firewall and access points put users at risk of remote code execution attacks. The post Zyxel Patches Remote Code Execution Bug in Firewall Products appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Zyxel Patches Remote Code Execution Bug in Firewall Products Read More »

DDoS Hacktivism is Back With a Geopolitical Vengeance

DDoS Hacktivism is Back With a Geopolitical Vengeance 2024-02-15 at 13:46 By Kevin Townsend DDoS attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance. The post DDoS Hacktivism is Back With a Geopolitical Vengeance appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

DDoS Hacktivism is Back With a Geopolitical Vengeance Read More »

Why Are Cybersecurity Automation Projects Failing?

Why Are Cybersecurity Automation Projects Failing? 2024-02-01 at 13:46 By Marc Solomon The cybersecurity industry has taken limited action to reduce cybersecurity process friction, reduce mundane tasks and improve overall user experience. The post Why Are Cybersecurity Automation Projects Failing? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Why Are Cybersecurity Automation Projects Failing? Read More »

US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon

US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon 2024-01-31 at 23:01 By Ryan Naraine The US government neutralizes a botnet full of end-of-life Cisco and Netgear routers being by a notorious Chinese APT group. The post US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon appeared first on

React to this headline:

Loading spinner

US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon Read More »

In the Context of Cloud, Security and Mobility, It’s Time Organizations Ditch Legacy MPLS

In the Context of Cloud, Security and Mobility, It’s Time Organizations Ditch Legacy MPLS 2024-01-25 at 19:46 By Etay Maor If organizations understand the benefits SASE offers over MPLS and traditional SD-WAN, they will realize that SASE is poised to replace aging MPLS in due time. The post In the Context of Cloud, Security and Mobility,

React to this headline:

Loading spinner

In the Context of Cloud, Security and Mobility, It’s Time Organizations Ditch Legacy MPLS Read More »

Achieving “Frictionless Defense” in the Age of Hybrid Networks

Achieving “Frictionless Defense” in the Age of Hybrid Networks 2024-01-17 at 15:31 By Matt Wilson A “frictionless defense” is about integrating security measures seamlessly into the digital landscape to safeguard against threats while ensuring a positive user experience. The post Achieving “Frictionless Defense” in the Age of Hybrid Networks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Achieving “Frictionless Defense” in the Age of Hybrid Networks Read More »

Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation

Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation 2024-01-16 at 16:16 By Ryan Naraine Quarkslab finds serious, remotely exploitable vulnerabilities in EDK II, the de-facto open source reference implementation of the UEFI spec. The post Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation Read More »

Scroll to Top