Information security specialists reported the detection of two security flaws affecting several firewall models developed by technology firm F5 Networks. According to...
Sophos security teams announced the fixing of a critical remote code execution (RCE) vulnerability in the Sophos Firewall family of products for...
A web application firewall (WAF) is a program designed to analyze incoming requests to a web server and, according to the rules...
Cybersecurity specialists report the detection of multiple vulnerabilities in pfSense, an open source and custom distribution of FreeBSD optimized for use in...
Most web applications today must be protected against multiple hacking variants, such as remote code execution (RCE), SQL injections, cross-site scripting (XS)...
Intelligence agencies in the U.K. and the U.S. disclosed details of a new botnet malware called Cyclops Blink that’s been attributed to...
On Wednesday, specialists from the technology firm F5 Networks published a detailed report on the finding of 25 vulnerabilities in some of...
The technology firm SonicWall confirmed that some of its firewall and email security solutions are being affected by the Y2K22 flaw, which...
Cybersecurity specialists from Positive Technologies report the detection of three critical vulnerabilities in the Adaptive Security Appliance (ASA) and Firepower Threat Defense...
Cross-site scripting (XSS) attacks are a variant of code injection that involves the use of specially crafted scripts on legitimate websites for...
The term web application firewall (WAF) refers to a set of monitoring tools and filters designed to detect and block network attacks...
Project Zero, Google’s cybersecurity unit, published research detailing its analysis of the Windows firewall and AppContainer, Microsoft’s runtime environment that restricts applications...
Cybersecurity specialists from the University of Maryland and the University of Colorado Boulder have recently published the verdict of a flaw that...
Weaknesses in the implementation of TCP protocol in middleboxes and censorship infrastructure could be weaponized as a vector to stage reflected denial...
Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information...
Cybersecurity experts report the discovery of a critical vulnerability in FortiWeb, the web application firewall (WAF) of the technology firm Fortinet. The...
Taiwanese networking equipment company Zyxel is warning customers of an ongoing attack targeting a “small subset” of its security products such as...
SonicWall security teams released a security alert to invite their customers to install patches that address a critical post-auth vulnerability present in...
FireEye cybersecurity specialists published details of a recent research related to the DarkSide ransomware operation. This week experts released reports on five...
Netgate Solutions announced the release of an update to fix a critical inter-site scripting vulnerability (XSS) impacting its PfSense solution, a FreeBSD-based...
A cybercriminal group is deploying a phishing campaign that uses a fraudulent website to collect Microsoft Office 365 credentials by creating html...