Network Security
80 материалов
- FCC Bans New Routers Made Outside the US Over National Security Risks
Network Security · Risk Management
The ban aligns with a White House determination that all routers produced abroad are a threat to national security. The post FCC Bans New Routers Made Outside the US Over National Security Risks appeared first on SecurityWeek.
- AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks
Network Security · Threat Intelligence
Akamai warns that Layer 7 DDoS, API abuse and AI-powered attacks are merging into coordinated, multi-vector campaigns that are harder to detect and defend against. The post AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks appeared first on SecurityWeek.
- New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security
Network Security · Mobile & Wireless
Researchers have uncovered a Wi-Fi vulnerability that allows nearby attackers to intercept sensitive data and execute machine-in-the-middle attacks against connected devices. The post New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security appeared first on SecurityWeek.
- Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS
Network Security
Threat actors relying on AI have been exploiting exposed ports and weak credentials to take over FortiGate devices. The post Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS appeared first on SecurityWeek.
- Organizations Urged to Replace Discontinued Edge Devices
Network Security · Risk Management
Edge devices that are no longer supported have been targeted in attacks by state-sponsored hackers, the US says. The post Organizations Urged to Replace Discontinued Edge Devices appeared first on SecurityWeek.
- Cyber Insights 2026: Zero Trust and Following the Path
Network Security
Zero Trust is not a thing; it is an idea. It is not a product; it is a concept – it is a destination that has no precise route and may never be reached. The post Cyber Insights 2026: Zero Trust and Following the Path appeared first on SecurityWeek.
- Cyber Insights 2026: Offensive Security; Where It Is and Where It’s Going
Network Security
Malicious attacks are increasing in frequency, sophistication and damage. Defenders need to find and harden system weaknesses before attackers can attack them. The post Cyber Insights 2026: Offensive Security; Where It Is and Where It’s Going appeared first on SecurityWeek.
- Cyber Insights 2026: External Attack Surface Management
Network Security
AI will assist companies in finding their external attack surface, but it will also assist bad actors in locating and attacking the weak points. The post Cyber Insights 2026: External Attack Surface Management appeared first on SecurityWeek.
- Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’
Network Security · Nation-State
A Chinese threat actor is exploiting known vulnerabilities in discontinued Asus devices in an Operational Relay Box (ORB) facilitation campaign. The post Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ appeared first on SecurityWeek.
- Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability
Network Security · Vulnerabilities
Security firms say the flaw has been actively exploited for weeks, even as Fortinet quietly shipped fixes and CISA added the bug to its KEV catalog. The post Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability appeared first on SecurityWeek.
- Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
Network Security
One of the flaws can be exploited by remote unauthenticated attackers for arbitrary command execution. The post Critical Vulnerabilities Patched in TP-Link’s Omada Gateways appeared first on SecurityWeek.
- All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
Network Security
In early September, hackers stole the firewall configuration backup files stored using the MySonicWall service. The post All SonicWall Cloud Backup Users Had Firewall Configurations Stolen appeared first on SecurityWeek.
- Virtual Event Today: Zero Trust & Identity Strategies Summit
Network Security
Join the virtual event we dive into the world of digital identity management and the role of zero-trust principles and associated technologies. The post Virtual Event Today: Zero Trust & Identity Strategies Summit appeared first on SecurityWeek.
- The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn
Network Security · Vulnerabilities
The Year 2036/2038 problem is a bug that will be triggered in more than a decade, but hackers could exploit it today against ICS and consumer devices. The post The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn appeared first on SecurityWeek.
- Cisco Patches Zero-Day Flaw Affecting Routers and Switches
Network Security · Vulnerabilities
The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user. The post Cisco Patches Zero-Day Flaw Affecting Routers and Switches appeared first on SecurityWeek.
- Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
Network Security
The attack was aimed at a European network infrastructure company and it has been linked to the Aisuru botnet. The post Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps appeared first on SecurityWeek.
- SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations
Network Security
The company sent a new preferences file to less than 5% of customers, urging them to import it into firewalls and reset their passwords. The post SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations appeared first on SecurityWeek.
- Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle
Network Security · Security Architecture
Fifteen years after its debut, Zero Trust remains the gold standard in cybersecurity theory — but its uneven implementation leaves organizations both stronger and dangerously exposed. The post Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle appeared first on SecurityWeek.
- US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack
Network Security · Vulnerabilities
Flaw allows attackers to reset and hijack TP-Link TL-WA855RE devices; CISA urges users to retire discontinued extenders. The post US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack appeared first on SecurityWeek.
- Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
Network Security
Part of a wave of DDoS attacks that lasted for weeks, the assault was a UDP flood, originating from several IoT and cloud providers. The post Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack appeared first on SecurityWeek.
- CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry
Network Security
CrowdStrike says the acquisition will bring valuable technology to enhance its Falcon Next-Gen SIEM. The post CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry appeared first on SecurityWeek.
- Citrix Patches Exploited NetScaler Zero-Day
Network Security · Vulnerabilities
Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies. The post Citrix Patches Exploited NetScaler Zero-Day appeared first on SecurityWeek.
- Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector
Network Security · Cybercrime
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats. The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared first on SecurityWeek.
- SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
Network Security
SonicWall has been investigating reports about a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability. The post SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability appeared first on SecurityWeek.
- Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments
Network Security
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments. The post Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments appeared first on SecurityWeek.
- Critical Vulnerabilities Patched in Sophos Firewall
Network Security · Vulnerabilities
Sophos has patched five vulnerabilities in Sophos Firewall that could allow remote attackers to execute arbitrary code. The post Critical Vulnerabilities Patched in Sophos Firewall appeared first on SecurityWeek.
- Darktrace Acquires Mira Security
M&A Tracker · Network Security
AI-powered cybersecurity company Darktrace has acquired network traffic visibility provider Mira Security. The post Darktrace Acquires Mira Security appeared first on SecurityWeek.
- SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware
Network Security · Ransomware
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit. The post SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware appeared first on SecurityWeek.
- Exploits, Technical Details Released for CitrixBleed2 Vulnerability
Network Security · Vulnerabilities
Researchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler. The post Exploits, Technical Details Released for CitrixBleed2 Vulnerability appeared first on SecurityWeek.
- Cisco Warns of Hardcoded Credentials in Enterprise Software
Network Security · Vulnerabilities
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root. The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.
- Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
Network Security
Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds. The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.
- The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce
Network Security · Mobile & Wireless
It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust strategy. The post The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce appeared first on SecurityWeek.
- Zero Networks Raises $55 Million for Microsegmentation Solution
Network Security · Cybersecurity Funding
Microsegmentation provider Zero Networks has raised $55 million in a Series C funding round led by Highland Europe. The post Zero Networks Raises $55 Million for Microsegmentation Solution appeared first on SecurityWeek.
- CISA Releases Guidance on SIEM and SOAR Implementation
Network Security
The guidance outlines the benefits and challenges or SIEM and SOAR platforms, and shares implementation recommendations. The post CISA Releases Guidance on SIEM and SOAR Implementation appeared first on SecurityWeek.
- Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities
Network Security · Vulnerabilities
Cisco published 10 security advisories detailing over a dozen vulnerabilities, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center. The post Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities appeared first on SecurityWeek.
- How Do You Know If You’re Ready for a Red Team Partnership?
Network Security · Risk Management
Before engaging in a full-scope exercise, it’s important to assess whether your program, people and processes are truly ready. The post How Do You Know If You’re Ready for a Red Team Partnership? appeared first on SecurityWeek.
- NetFoundry Raises $12 Million for Network Security Solutions
Network Security · Cybersecurity Funding
Zero-trust network security solutions provider NetFoundry has raised $12 million in funding from SYN Ventures. The post NetFoundry Raises $12 Million for Network Security Solutions appeared first on SecurityWeek.
- Network Access Vendor Portnox Secures $37.5 Million Investment
Network Security
Texas network access control startup closes a Series B round led by Updata Partners and brings the total raised to $60 million. The post Network Access Vendor Portnox Secures $37.5 Million Investment appeared first on SecurityWeek.
- DNS: The Secret Weapon CISOs May Be Overlooking in the Fight Against Cyberattacks
Network Security
While often relegated to a purely functional role, DNS offers unparalleled opportunities for preemptive defense against cyberattacks. The post DNS: The Secret Weapon CISOs May Be Overlooking in the Fight Against Cyberattacks appeared first on SecurityWeek.
- Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances
Network Security · Malware & Threats
Ivanti misdiagnoses a remote code execution vulnerability and Mandiant reports that Chinese hackers are launching in-the-wild exploits. The post Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances appeared first on SecurityWeek.
- Questions Remain Over Attacks Causing DrayTek Router Reboots
Network Security
DrayTek has shared some clarifications regarding the recent attacks causing router reboots, but some questions remain unanswered. The post Questions Remain Over Attacks Causing DrayTek Router Reboots appeared first on SecurityWeek.
- Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program
Network Security · Incident Response
A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost. The post Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program appeared first on SecurityWeek.
- Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots
Network Security
DrayTek routers around the world are rebooting and the vendor’s statement suggests that it may involve the exploitation of a vulnerability. The post Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots appeared first on SecurityWeek.
- Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US
Network Security
The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US. The post Despite Rip-and-Replace Efforts, FCC Suspects Banned Chinese Telecom Providers Still Active in US appeared first on SecurityWeek.
- Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Network Security · Malware & Threats
Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek.
- Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
Network Security · Nation-State
China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers. The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek.
- Hackers Take Credit for X Cyberattack
Network Security
Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt. The post Hackers Take Credit for X Cyberattack appeared first on SecurityWeek.
- Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down
Network Security
Elon Musk claimed that the social media platform X was being targeted in a “massive cyberattack" that impacted availability. The post Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down appeared first on SecurityWeek.
- Skybox Security Shuts Down, Lays Off Entire Workforce
Network Security
The sudden shutdown follows the sale of Skybox Security’s business and technology assets to rival Israeli cybersecurity firm Tufin. The post Skybox Security Shuts Down, Lays Off Entire Workforce appeared first on SecurityWeek.
- Five Eyes Agencies Release Guidance on Securing Edge Devices
Network Security
Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats. The post Five Eyes Agencies Release Guidance on Securing Edge Devices appeared first on SecurityWeek.
- Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise
Network Security
The lawsuit said that the combination of businesses would eliminate competition, raise prices and reduce innovation. The post Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise appeared first on SecurityWeek.
- FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know
Network Security · Malware & Threats
The US government shared exploit chains, IOCs and post-incident forensics data to help network defenders hunt for signs of Chinese hacking gangs. The post FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know appeared first on SecurityWeek.
- Record-Breaking DDoS Attack Reached 5.6 Tbps
Network Security
Cloudflare saw a 53% increase in DDoS attack frequency last year, when it blocked a record-breaking 5.6 Tbps attack. The post Record-Breaking DDoS Attack Reached 5.6 Tbps appeared first on SecurityWeek.
- Cyber Insights 2025: Attack Surface Management
Network Security
SecurityWeek's Cyber Insights 2025 examines expert opinions to gain their opinions on what to expect in Attack Surface Management in 2025. The post Cyber Insights 2025: Attack Surface Management appeared first on SecurityWeek.
- Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws
Network Security · Vulnerabilities
New research shows that over 4 million systems on the internet, including VPN servers and home routers, are vulnerable to attacks due to tunneling protocol flaws. The post Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws appeared first on SecurityWeek.
- Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product
Network Security · Malware & Threats
Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line. The post Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product appeared first on SecurityWeek.
- Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances
Network Security · Vulnerabilities
Citrix issues warning on password spraying attacks targeting NetScaler and NetScaler Gateway appliances deployed by organizations worldwide. The post Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances appeared first on SecurityWeek.
- Government Guidance on Chinese Telco Hacking Highlights Threat to Cisco Devices
Network Security
Government agencies issue guidance on Chinese telecoms hacking as US officials say threat actors may have yet to be expelled. The post Government Guidance on Chinese Telco Hacking Highlights Threat to Cisco Devices appeared first on SecurityWeek.
- After CrowdStrike Outage, Microsoft Debuts ‘Quick Machine Recovery’ Tool
Network Security · Incident Response
Microsoft debuts Quick Machine Recovery tool to apply fixes even when machines are unable to boot, without needing physical access. The post After CrowdStrike Outage, Microsoft Debuts ‘Quick Machine Recovery’ Tool appeared first on SecurityWeek.
- IP Spoofing Attack Tried to Disrupt Tor Network
Network Security
A coordinated IP spoofing attack that involved port scans tried to disrupt the Tor network by getting relays on blocklists. The post IP Spoofing Attack Tried to Disrupt Tor Network appeared first on SecurityWeek.
- US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ Hack
Network Security · Nation-State
The US government's CFPB sent an email with a simple directive: “Do NOT conduct CFPB work using mobile voice calls or text messages.” The post US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ Hack appeared first on SecurityWeek.
- HPE Patches Critical Vulnerabilities in Aruba Access Points
Network Security
HPE this week warned of two critical vulnerabilities in Aruba Networking access points that could lead to unauthenticated command injection. The post HPE Patches Critical Vulnerabilities in Aruba Access Points appeared first on SecurityWeek.
- NCSC Details ‘Pygmy Goat’ Backdoor Planted on Hacked Sophos Firewall Devices
Network Security · Nation-State
A stealthy network backdoor found on hacked Sophos XG firewall devices is programmed to work on a broader range of Linux-based devices. The post NCSC Details ‘Pygmy Goat’ Backdoor Planted on Hacked Sophos Firewall Devices appeared first on SecurityWeek.
- WhiteRabbitNeo: High-Powered Potential of Uncensored AI Pentesting for Attackers and Defenders
Network Security · Artificial Intelligence
Version 2.5 of WhiteRabbitNeo is designed to think like a seasoned red team expert, capable of identifying and exploiting vulnerabilities with remarkable speed and precision. The post WhiteRabbitNeo: High-Powered Potential of Uncensored AI Pentesting for Attackers and Defenders appeared first on SecurityWeek.
- Cisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaign
Network Security
Cisco has released patches for multiple vulnerabilities in ASA, FMC, and FTD products, including an exploited flaw. The post Cisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaign appeared first on SecurityWeek.
- Fortinet Confirms Zero-Day Exploit Targeting FortiManager Systems
Network Security · Malware & Threats
Fortinet confirms zero-day exploits hitting critical (CVSS severity score 9.8/10) remote code execution bug in the FortiManager platform. The post Fortinet Confirms Zero-Day Exploit Targeting FortiManager Systems appeared first on SecurityWeek.
- Cyprus Thwarted a Digital Attack Against the Government’s Main Online Portal
Network Security
Cyprus said that it has successfully thwarted a DDoS attack aimed at blocking access to the government’s central online portal. The post Cyprus Thwarted a Digital Attack Against the Government’s Main Online Portal appeared first on SecurityWeek.
- Watch Now: Zero Trust Strategies Summit – All Sessions Available on Demand
Network Security
With all sessions now available on demand, the online summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. The post Watch Now: Zero Trust Strategies Summit – All Sessions Available on Demand appeared first on SecurityWeek.
- Palo Alto Patches Critical Firewall Takeover Vulnerabilities
Network Security · Vulnerabilities
Palo Alto warns that attackers can access usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. The post Palo Alto Patches Critical Firewall Takeover Vulnerabilities appeared first on SecurityWeek.
- New Vulnerabilities Expose Hundreds of Thousands of DrayTek Routers to Hacking
Network Security
Forescout has identified more than a dozen new vulnerabilities in DrayTek routers, exposing hundreds of thousands of devices to attacks. The post New Vulnerabilities Expose Hundreds of Thousands of DrayTek Routers to Hacking appeared first on SecurityWeek.
- Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps
Network Security
Cloudflare recently mitigated another record-breaking DDoS attack, peaking at 3.8 Tbps and 2.14 billion Pps. The post Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps appeared first on SecurityWeek.
- Videos: Attack Surface Management Summit – All Sessions Available on Demand
Network Security
Sessions from SecurityWeek's 2024 Attack Surface Management are now available to watch on demand. The post Videos: Attack Surface Management Summit – All Sessions Available on Demand appeared first on SecurityWeek.
- Evasion Tactics Used By Cybercriminals To Fly Under The Radar
Cybercrime · Network Security
Relentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics Used By Cybercriminals To Fly Under The Radar appeared first on SecurityWeek.
- DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign
Network Security
Two DrayTek vulnerabilities added by CISA to its KEV catalog have been exploited by multiple threat groups to steal data from organizations worldwide. The post DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign appeared first on SecurityWeek.
- China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches
Nation-State · Network Security
Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches appeared first on SecurityWeek.
- Reframing the ZTNA vs. SASE Debate
Identity & Access · Network Security
While ZTNA can be deployed independently, it is an integral component of the SASE architecture as well. The post Reframing the ZTNA vs. SASE Debate appeared first on SecurityWeek.
- ZeroTier Raises $13.5 Million in Series A Funding
Cybersecurity Funding · Network Security
Virtual networking provider ZeroTier has raised $13.5 million in a Series A funding round led by Battery Ventures. The post ZeroTier Raises $13.5 Million in Series A Funding appeared first on SecurityWeek.
- CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities in Network Devices
Network Security
In response to recent intrusions, CISA and the FBI are urging businesses and device manufacturers to eliminate OS command injection vulnerabilities at the source. The post CISA, FBI Urge Immediate Action on OS Command Injection Vulnerabilities in Network Devices appeared first on SecurityWeek.
- Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool
Network Security · Vulnerabilities
Palo Alto Networks patched a critical vulnerability in its Expedition tool and addressed the impact of the recently disclosed BlastRADIUS vulnerability. The post Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool appeared first on SecurityWeek.
- BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol
Identity & Access · Network Security
Security vendor InkBridge Networks calls urgent attention to the discovery of a decades-old design flaw (CVE-2024-3596) in the popular RADIUS protocol. The post BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol appeared first on SecurityWeek.
