Network Security

Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in the Ivanti Connect Secure and Policy Secure Gateways. These vulnerabilities were associated with…

7 months ago

NSA Details Seven Pillars Of Zero Trust

The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization's network…

8 months ago

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access point (AP) versions that are associated…

8 months ago

Wireshark 4.2.3 Released – What’s New!

Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education. However, Wireshark…

9 months ago

ZTNA vs VPN: What is the Difference? Will ZTNA Replace VPN?

In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as…

11 months ago

MySQL Security Best Practices Guide – 2024

MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that…

11 months ago

Wireshark 4.2.0 Released: What’s New!

Wireshark, a leading network packet analyzer, has released version 4.2.0, which brings bug fixes, protocol updates, major API changes, codec support, and several new features.…

12 months ago

What is Network Detection and Response (NDR)?

In the ever-evolving digital world, organizations must safeguard their networks and sensitive data against sophisticated cyber threats. Have you ever…

12 months ago

Wireshark 4.0.8 Release: What’s New!

The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network…

1 year ago

CISA Guide to Network and System Administrators to Harden Cisco Firewalls

The National Security Agency (NSA) has released best practices for configuring and hardening Cisco Firepower Threat Defense (FTD) which can…

1 year ago