firewall

  • Blog

    SonicWall firewall bug leveraged in attacks after PoC exploit release

    Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code. This security flaw (CVE-2024-53704), tagged by CISA as critical severity and found in the SSLVPN authentication mechanism, impacts SonicOS versions 7.1.x (up to 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035, used by multiple models of Gen 6 and Gen 7 firewalls and SOHO…

    Read More »
  • Blog

    Fortinet discloses second firewall auth bypass patched in January

    Update 2/11/25 07:32 PM ET: After publishing our story, Fortinet has informed us that the new CVE-2025-24472 flaw added to FG-IR-24-535 today is not a zero-day and was already fixed in January. Furthermore, even though today’s updated advisory indicates that both flaws were exploited in attacks and even includes a workaround for the new CSF proxy requests exploitation pathway, Fortinet says that only CVE-2024-55591 was…

    Read More »
  • Blog

    Zyxel warns of bad signature update causing firewall boot loops

    Zyxel is warning that a bad security signature update is causing critical errors for USG FLEX or ATP Series firewalls, including putting the device into a boot loop. “We’ve found an issue affecting a few devices that may cause reboot loops, ZySH daemon failures, or login access problems,” warns a new Zyxel advisory. “The system LED may also flash. Please note this…

    Read More »
  • Blog

    5 Signs You Need a Virtual Firewall to Secure Your Cloud

    As businesses increasingly shift to cloud-based and virtualized environments, traditional network security approaches — particularly firewalls — are falling short. Virtual firewalls, purpose-built for environments like public and private clouds or Software-Defined Wide Area Networks (SD-WAN), have emerged as a critical solution. Their ability to scale dynamically and integrate deeply with virtual infrastructure enables security tailored to the demands of…

    Read More »
  • Blog

    Sophos discloses critical Firewall remote code execution flaw

    Sophos has addressed three vulnerabilities in its Sophos Firewall product that could allow remote unauthenticated threat actors to perform SQL injection, remote code execution, and gain privileged SSH access to devices. The vulnerabilities affect Sophos Firewall version 21.0 GA (21.0.0) and older, with the company already releasing hotfixes that are installed by default and permanent fixes through new firmware updates. The…

    Read More »
  • Blog

    What Is a Host Based Firewall and Is it Secure Enough?

    A host-based firewall is installed and run on a single device, like a laptop, cell phone, or server. These firewalls are tailored to individual devices so they can monitor and control its specific traffic — as opposed to network-based firewalls, which protect an entire network of devices. Most consumer devices come with host-based firewalls pre-installed. If you use an HP…

    Read More »
  • Blog

    The 6 Tradeoffs Between a Stateful vs Stateless Firewall

    A stateful firewall keeps track of the state of network connections. A stateless firewall does not. Although the difference between a stateful vs stateless firewall is relatively simple, picking one may not be as straightforward. The state of a network connection refers to its status, whether a connection is being established, actively transferring data, or closing. Stateful firewalls keep track…

    Read More »
  • Blog

    5 Reasons to Use a Stateless Firewall (+3 Key Downsides)

    In networking, “state” refers to the context or session data of a current network connection. A stateful firewall, therefore, keeps track of the state of each connection passing through it, while a stateless firewall does not. Although they may sound less restrictive, stateless firewalls are incredibly useful for securing home and business networks. They use ACLs (Access Control Lists) to…

    Read More »
  • Blog

    5 Reasons a Stateful Firewall Is a Must-Have for Business

    A stateful firewall is capable of tracking the state of active connections between devices on the network. It logs when devices are requesting data, sending data, or closing the connection. With this context, a stateful firewall knows whether incoming data is part of an established, legitimate session or if it’s an unsolicited request that needs to be blocked. This allows…

    Read More »
  • Blog

    Palo Alto Networks warns of firewall hijack bugs with public exploit

    Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls. The flaws were found in Palo Alto Networks’ Expedition solution, which helps migrate configurations from other Checkpoint, Cisco, or supported vendors. They can be exploited to access sensitive data, such as user credentials, that can help…

    Read More »
Back to top button
close