HackDig : Dig high-quality web security articles

The OSI Model and You Part 3: Stopping Threats at the OSI Network Layer

Networking models help us understand the ‘lay of the land’ when it comes to protecting the network. In our journey through the Open Systems Interconnection (OSI) framework, we’ve arrived at the last stop in the media group, the OSI network layer. Remember, we’ve gotten here via the OSI data link layer, or the ‘how’ the ze
Publish At:2021-06-07 09:51 | Read:415 | Comments:0 | Tags:Mobile Security Network Security Services Corporate Network

The Cybersecurity Ecosystem: How Did It Get So Crowded?

Peek inside any enterprise security operations center (SOC) today, and you’ll likely see a crowded and high-pressure cybersecurity ecosystem. Over the past few years, as technology evolved rapidly, attackers have developed a growing array of strategies and tactics. In response, security organizations have deployed more and more tools and point solutio
Publish At:2021-05-26 17:25 | Read:525 | Comments:0 | Tags:Security Intelligence & Analytics CISO Cloud Security Securi

What is a Personal Firewall?

What is a Personal Firewall? May 9th, 2021 No Comments Data Privacy, Data Protection, Firewall, Network Security, Online Privacy, Online Safety, PC security Firewalls are a term many know as protective of their computers from cyberattacks, but not m
Publish At:2021-05-09 11:35 | Read:792 | Comments:0 | Tags:Data Privacy Data Protection Firewall Network Security Onlin

How a Firewall Can Foster Zero Trust

Older perimeter-based firewalls aren’t up to the task of safeguarding today’s more distributed networks. But that doesn’t mean the end of the firewall is in sight. On the contrary, businesses and other groups are turning to next-generation firewalls (NGFWs) hosted in the cloud to fulfill their evolving security needs. These ‘virtual&
Publish At:2021-05-07 13:46 | Read:732 | Comments:0 | Tags:Cloud Security Data Protection Network Security Services Zer

Is the End of the Firewall in Sight?

Is a firewall a thing of the past? People have been questioning the utility of firewalls for years. Columnist and editor Roger A. Grimes wrote that “firewalls need to go away” in May 2012. Grimes reasoned this was because firewalls “have always been problematic, and today there is almost no reason to have one.” Is Grimes right? Is th
Publish At:2021-02-01 18:45 | Read:870 | Comments:0 | Tags:Cloud Security Network Cloud Firewall Network Security

pfSense Firewall Configuration Audit with pfAudit

pfSense is a very popular free and open source firewall solution. It does not only provide classic firewall services but has plenty of features like VPN server or can offer DNS, DHCP, proxy services… and many more. pfSense is also proposed by some companies as a commercial service with support. That’s why it is used in many organisations. Abo
Publish At:2020-12-14 13:19 | Read:1028 | Comments:0 | Tags:Python Security Software Audit Configuration Firewall JSON p

Why is it called a firewall?

Firewalls have become a standard aspect of internet security. There’s one built into your home WiFi router for instance, and your computer may use one too. But how did a relatively boring technology get such a cool name? Why is it called a firewall? A name stolen from the construction industry Firewalls have existed for many years, long before the Internet b
Publish At:2020-11-26 12:46 | Read:968 | Comments:0 | Tags:Mobile News Firewall security

30 Ransomware Prevention Tips

Dealing with the aftermath of ransomware attacks is like Russian roulette. Submitting the ransom might seem like it’s the sole option for recovering locked data. But paying the ransom doesn’t mean that your organization will get its affected data back.Let’s not forget that ransomware also continues to evolve as a threat category. Beginning in late November 2
Publish At:2020-10-05 06:43 | Read:1259 | Comments:0 | Tags:Cyber Security Featured Articles Backup firewall password Ph

Cisco fixes 5 critical flaws that could allow router firewall takeover

Cisco addresses a critical remote code execution (RCE), authentication bypass, and static default credential flaws that could lead to full router takeover. Cisco has released security updates to address critical remote code execution (RCE), authentication bypass, and static default credential vulnerabilities affecting multiple router and firewall devices.
Publish At:2020-07-16 04:58 | Read:1794 | Comments:0 | Tags:Breaking News Hacking Security CISCO firewall hacking news i

APTs will exploit Palo Alto Networks’s PAN-OS flaw soon, US Cyber Command says

U.S. Cyber Command believes foreign APTs will likely attempt to exploit the recently addressed flaw in Palo Alto Networks’s PAN-OS firewall OS. Recently Palo Alto Network addressed a critical vulnerability, tracked as CVE-2020-2021, affecting the PAN-OS operating system that powers its next-generation firewall. The flaw could allow unauthenticated n
Publish At:2020-06-30 17:53 | Read:1486 | Comments:0 | Tags:Breaking News Hacking firewall hacking news information secu

Palo Alto Networks fixes a critical flaw in firewall PAN-OS

Palo Alto Networks addressed a critical flaw in the PAN-OS of its next-generation firewalls that could allow attackers to bypass authentication. Palo Alto Networks addressed a critical vulnerability, tracked as CVE-2020-2021, in the operating system (PAN‑OS) that powers its next-generation firewalls that could allow unauthenticated network-based attackers
Publish At:2020-06-30 02:26 | Read:1935 | Comments:0 | Tags:Breaking News Hacking CVE-2020-2021 firewall hacking news in

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:1865 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

FTP Injection flaws in Java and Python allows firewall bypass

The two programming languages, Java and Python, are affected by serious FTP Injection flaws that can be exploited by hackers to bypass any firewall. Attackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls The unpatched flaws reside in the way the two programming languages handle File Transfer Protocol
Publish At:2017-02-22 21:30 | Read:7087 | Comments:0 | Tags:Breaking News Hacking firewall FTP Injection Java Python sec

Football and Firewalls: A Winning Game Plan to Improve Network Security

As we approach Thanksgiving in the U.S., the one thing I look forward to the most — aside from turkey and spending time with my family — is football. As I watch the games, the security geek in me can’t help but notice some parallels between football and network security, particularly firewalls and intrusion prevention. Network Security Playbook During
Publish At:2016-11-23 00:40 | Read:7421 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint firewall Firewa

Experts disclosed a critical flaw in Schneider Industrial Firewalls

CyberX experts at the SecurityWeek’s 2016 ICS Cyber Security Conference disclosed a critical flaw in the Schneider Industrial Firewalls. This week, at the SecurityWeek’s 2016 ICS Cyber Security Conference, researchers at industrial security firm CyberX disclosed several important vulnerabilities. The experts demonstrated how hackers can target ICS systems an
Publish At:2016-10-27 12:25 | Read:6007 | Comments:0 | Tags:Breaking News Hacking firewall ICS PLC SCADA Schneider indus


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud