article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

Sophos pushes a hotfix to address a SQL injection vulnerability in Sophos XG Firewall that was exploited in the wild. On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. Background. Proof of concept.

Firewall 101
article thumbnail

Palo Alto Networks a Leader in Forrester Enterprise Firewalls Report

Palo Alto Networks

We created the first Next-Generation Firewall (NGFW) more than a decade ago and have continued to keep our customers ahead of fast-evolving threats in the years since then. Forrester has named Palo Alto Networks a Leader in its Forrester Wave : Enterprise Firewalls, Q3 2020 report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top 10 Cybersecurity Threats in 2020

Kaseya

Just like the coronavirus spreads from person to person, cybersecurity malware too can spread rapidly from computer to computer and network to network. Here are the top 10 cybersecurity threats businesses face in 2020: Phishing Attacks. Misconfiguration will drive a majority of the incidents according to the Sophos 2020 Threat Report.

Malware 136
article thumbnail

Four Priorities for Better Endpoint Management in 2020

Kaseya

Using 2FA is a critical requirement to protect your business and, if you are a Managed Service Provider (MSP), your clients’ businesses from hackers that try to use RMM tools to access your networks and deploy malware. Endpoint detection and response (EDR) differs from traditional antivirus and anti-malware. Kaseya AuthAnvil .

Backup 120
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

Dutch Authorities disclose that CVE-2022-42475 was abused to spread malware On February 6, Dutch authorities released a cybersecurity advisory about an attack against the Netherlands Ministry of Defence (MOD) in which attackers exploited CVE-2022-42475 against a Fortigate device to gain initial access and deploy malware known as "COATHANGER."

Malware 121
article thumbnail

Versa raises $120M for its software-defined networking and security stack

TechCrunch

billion compared to 2020 (albeit down from $26.52 Through partnerships with service providers, Versa connects users to apps in the cloud or data centers with security layered on top — like data loss prevention tools and gateway firewalls. According to data from PitchBook, venture capital investments have reached about $13.66

Security 193
article thumbnail

When least privilege is the most important thing

CIO

Organizations that follow the principle of least privilege can improve their security posture by significantly reducing their attack surface and risk of malware spread. There were countless types of attacks, from accidentally downloading malware to a webpage that exploited a browser bug and more. Within a ZTNA 2.0