Remove Blog Remove Firewall Remove Operating System
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

Sophos pushes a hotfix to address a SQL injection vulnerability in Sophos XG Firewall that was exploited in the wild. On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. Background. Proof of concept.

Firewall 101
article thumbnail

Why Proxy-Based Firewalls Are Not Enough

Palo Alto Networks

Proxy-based firewalls or web proxies have been considered an essential security component for some time now, but the question remains: Can proxies really help keep users safe? The first proxy-based firewalls achieved the basic task of controlling which websites users could access on the Internet. Effectiveness.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2024-3400: Zero-Day Vulnerability in Palo Alto Networks PAN-OS GlobalProtect Gateway Exploited in the Wild

Tenable

Background On April 12, Palo Alto Networks released a security advisory for a critical command injection vulnerability affecting PAN-OS, the custom operating system (OS) Palo Alto Networks (PAN) uses in their next-generation firewalls. According to the advisory, this vulnerability impacts PAN-OS versions 10.2,

Network 120
article thumbnail

Cybersecurity Snapshot: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance

Tenable

We have completely revamped this updated 5th version to align with modern technologies and challenges,” reads the CSA blog “ New Cloud Security Guidance from CSA. CISA has authorization to conduct SilentShield assessments, whose purpose is to work with the impacted agency and help its security team strengthen its cyberdefenses.

article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6 FortiOS 6.2.0

Malware 123
article thumbnail

Cybersecurity Snapshot: U.K. Cyber Agency Urges Software Vendors To Boost Product Security, While U.S. Gov’t Wants Info on Banks’ AI Use

Tenable

CIS Palo Alto Firewall 10 Benchmark v1.2.0 CIS Palo Alto Firewall 11 Benchmark v1.1.0 There are Benchmarks for cloud platforms; databases; desktop and server software; mobile devices; operating systems; and more. To get more details, read the CIS blog “ CIS Benchmarks June 2024 Update.”

article thumbnail

Sending Real-Time Logs to Splunk Cloud Using Universal Forwarder

Perficient

If you don’t have an account yet, you can follow the instructions provided in the blog, “Understanding Splunk and Setting Up Splunk Cloud,” to get started. Universal Forwarder Installation Package: Downloaded for your specific operating system. Access to Log Files: Identified and accessible log files for monitoring.

Cloud 52