HackDig : Dig high-quality web security articles for hackers

pfSense Firewall Configuration Audit with pfAudit

pfSense is a very popular free and open source firewall solution. It does not only provide classic firewall services but has plenty of features like VPN server or can offer DNS, DHCP, proxy services… and many more. pfSense is also proposed by some companies as a commercial service with support. That’s why it is used in many organisations. Abo
Publish At:2020-12-14 13:19 | Read:210 | Comments:0 | Tags:Python Security Software Audit Configuration Firewall JSON p

Why is it called a firewall?

Firewalls have become a standard aspect of internet security. There’s one built into your home WiFi router for instance, and your computer may use one too. But how did a relatively boring technology get such a cool name? Why is it called a firewall? A name stolen from the construction industry Firewalls have existed for many years, long before the Internet b
Publish At:2020-11-26 12:46 | Read:279 | Comments:0 | Tags:Mobile News Firewall security

30 Ransomware Prevention Tips

Dealing with the aftermath of ransomware attacks is like Russian roulette. Submitting the ransom might seem like it’s the sole option for recovering locked data. But paying the ransom doesn’t mean that your organization will get its affected data back.Let’s not forget that ransomware also continues to evolve as a threat category. Beginning in late November 2
Publish At:2020-10-05 06:43 | Read:350 | Comments:0 | Tags:Cyber Security Featured Articles Backup firewall password Ph

Cisco fixes 5 critical flaws that could allow router firewall takeover

Cisco addresses a critical remote code execution (RCE), authentication bypass, and static default credential flaws that could lead to full router takeover. Cisco has released security updates to address critical remote code execution (RCE), authentication bypass, and static default credential vulnerabilities affecting multiple router and firewall devices.
Publish At:2020-07-16 04:58 | Read:804 | Comments:0 | Tags:Breaking News Hacking Security CISCO firewall hacking news i

APTs will exploit Palo Alto Networks’s PAN-OS flaw soon, US Cyber Command says

U.S. Cyber Command believes foreign APTs will likely attempt to exploit the recently addressed flaw in Palo Alto Networks’s PAN-OS firewall OS. Recently Palo Alto Network addressed a critical vulnerability, tracked as CVE-2020-2021, affecting the PAN-OS operating system that powers its next-generation firewall. The flaw could allow unauthenticated n
Publish At:2020-06-30 17:53 | Read:769 | Comments:0 | Tags:Breaking News Hacking firewall hacking news information secu

Palo Alto Networks fixes a critical flaw in firewall PAN-OS

Palo Alto Networks addressed a critical flaw in the PAN-OS of its next-generation firewalls that could allow attackers to bypass authentication. Palo Alto Networks addressed a critical vulnerability, tracked as CVE-2020-2021, in the operating system (PAN‑OS) that powers its next-generation firewalls that could allow unauthenticated network-based attackers
Publish At:2020-06-30 02:26 | Read:889 | Comments:0 | Tags:Breaking News Hacking CVE-2020-2021 firewall hacking news in

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:1099 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

FTP Injection flaws in Java and Python allows firewall bypass

The two programming languages, Java and Python, are affected by serious FTP Injection flaws that can be exploited by hackers to bypass any firewall. Attackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls The unpatched flaws reside in the way the two programming languages handle File Transfer Protocol
Publish At:2017-02-22 21:30 | Read:6282 | Comments:0 | Tags:Breaking News Hacking firewall FTP Injection Java Python sec

Football and Firewalls: A Winning Game Plan to Improve Network Security

As we approach Thanksgiving in the U.S., the one thing I look forward to the most — aside from turkey and spending time with my family — is football. As I watch the games, the security geek in me can’t help but notice some parallels between football and network security, particularly firewalls and intrusion prevention. Network Security Playbook During
Publish At:2016-11-23 00:40 | Read:5684 | Comments:0 | Tags:Infrastructure Protection Network & Endpoint firewall Firewa

Experts disclosed a critical flaw in Schneider Industrial Firewalls

CyberX experts at the SecurityWeek’s 2016 ICS Cyber Security Conference disclosed a critical flaw in the Schneider Industrial Firewalls. This week, at the SecurityWeek’s 2016 ICS Cyber Security Conference, researchers at industrial security firm CyberX disclosed several important vulnerabilities. The experts demonstrated how hackers can target ICS systems an
Publish At:2016-10-27 12:25 | Read:5354 | Comments:0 | Tags:Breaking News Hacking firewall ICS PLC SCADA Schneider indus

Going Beyond the Firewall to Tackle Today’s Cyberthreats

Firewalls are staples of network security, and for years, they’ve played a part in keeping networks safe by restricting both incoming and outgoing network traffic. Along with antivirus software, they are among the oldest and most widely used cybersecurity tools.But what role should firewalls play in 2016 and beyond? One thing is clear: even though they’ve ev
Publish At:2016-09-12 03:40 | Read:4255 | Comments:0 | Tags:Cyber Security Featured Articles cybersecurity firewall pass

Firepower NGFW Steps up to Deliver Greater Effectiveness with Reduced Costs and Complexity

Full NGFW integration yields streamlined security and greater value from investmentsWe know that security, when done properly, can be a business enabler. But as IT teams build out their security capabilities, the lack of integrated solutions yields lower threat effectiveness and inevitably leads to an explosion of complexity and cost.When Cisco developed the
Publish At:2016-02-18 18:05 | Read:5015 | Comments:0 | Tags:Security Cisco FirePOWER cisco firewall FirePOWER Firepower

Introducing Cisco Firepower 4100 Series Next-Generation Firewall

Enable Digital Business with the Industry’s First Fully Integrated, Threat-Focused NGFWToday’s world is undergoing digital disruption that will spark more connectivity than ever before, as consumers, businesses and governments leverage digitization to drive innovation forward. Yet, the more connected we become, the more opportunities we create for cybercrimi
Publish At:2016-02-16 11:50 | Read:5251 | Comments:0 | Tags:Security Cisco FirePOWER cisco firewall FirePOWER Firepower

Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers

A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively, according to a sanitized version of a secret federal audit. The National Cybersecurity Protection System (NCPS), also known as EINSTEIN, is a firewall r
Publish At:2016-02-01 12:55 | Read:4354 | Comments:0 | Tags:Breaking News Intelligence Security Cybersecurity DHS EINSTE

Threat-Focused NG-Firewall – Who Cares? Part 2

This is Part 2 of our blog series about NG-Firewalls. See Part 1 here.Part 2: Enter Threat-Focused NG-FirewallWhat does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall system, (a Threat-Focused NG-Firewall).If you consider the typ
Publish At:2015-12-17 11:00 | Read:4373 | Comments:0 | Tags:Security Cisco ASA with FirePOWER Services firewall Next-Gen


Tag Cloud