EHA
Multiple Fortinet Vulnerabilities

Multiple Fortinet Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been discovered in FortiOS and FortiProxy that were related to administrator cookie leakage, arbitrary command execution and sensitive information exposure. These vulnerabilities have been assigned with CVEs as CVE-2023-41677, CVE-2023-48784 and...
Hackers Using Malware-Driven Scanning Attacks To Pinpoint Vulnerabilities

Hackers Using Malware-Driven Scanning Attacks To Pinpoint Vulnerabilities

Attackers are now using malware-infected devices to scan target networks instead of directly scanning them. This approach helps them to hide their identity, evade geographical restrictions (geofencing), and grow their botnets. Compromised hosts provide more...
Apache HTTP Server Flaw Let Attackers Inject Malicious Headers Amd HTTP/2 DoS

Apache HTTP Server Flaw Let Attackers Inject Malicious Headers & HTTP/2 DoS

Apache released updates to address several vulnerabilities impacting the Apache HTTP server that let attackers launch HTTP/2 DoS attacks and insert malicious headers. Server operations are being adversely affected by these vulnerabilities, which are proving to...
D-Link NAS Command Injection Flaw : 92,000 Devices Affected

D-Link NAS Command Injection Flaw : 92,000 Devices Affected

A new command injection vulnerability and a backdoor account have been discovered in D-Link Network Attached Storage devices, which affects D-Link NAS devices, including DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. This exists in the...
Wireshark 4.2.4

Wireshark 4.2.4 Released : What’s New!

Wireshark remains the go-to choice for both professionals and enthusiasts due to its unmatched capabilities in packet capturing and analysis. Its advanced features and user-friendly interface make it an indispensable tool for network troubleshooting...
Critical OpenVPN Flaw Let Attackers Escalate Privilege

Critical OpenVPN Flaw Let Attackers Escalate Privilege

OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the Windows Platform of the VPN application. Four vulnerabilities were also fixed as part of...
Researched Exploit DHCP To Escalate Privileges In Windows Domains

Hackers Exploit DHCP To Escalate Privileges In Windows Domains

Researchers at Akamai have unveiled a new technique that could potentially put millions of Windows domains at risk. This technique exploits the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Active...
Choosing The Right Proxy Server And Port : A Practical Guide

Choosing The Right Proxy Server And Port : A Practical Guide

Imagine a situation where you are engaged in web scraping, streaming, or any virtual exploits, and your proxy selection is the epicenter of it all. How can you determine the best server for a...
How to Set Up a Network Research Laboratory for Malware Analysis

How to Set Up a Network Research Laboratory for Malware Analysis (SOC & DFIR...

To analyze a security vulnerability (CVE-2024-21413) in Outlook, a controlled environment can be set up using a virtual machine (ANY.RUN) within a local virtual private network (VPN).  Researchers can learn more about the exploit by...
Best Network Security Solutions for CSO

10 Best Network Security Solutions for Chief Security Officer to Consider – 2024

Any place that stores sensitive information is a prime target for hackers worldwide, and government institutes hold the most critical amount of data about a country and its citizens. Making it a top priority to...

Managed WAF

Website

Latest News