Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Harness Netskope Steering APIs for Scalable SD-WAN Deployments

In large-scale SD-WAN deployments, both enterprises and Managed Security Service Providers (MSSPs) place a high priority on ensuring that SD-WAN CPEs seamlessly integrate with the nearest Netskope NewEdge Network Point of Presence (PoP). Automating this integration process is crucial as it not only saves considerable time but also boosts business agility.

How to Evaluate if Your Business Needs a VPN or RDP? What's the Difference?

The need for secure remote access solutions has increased in today's digital era. About two-thirds of businesses have had their data stolen because employees work from home. Four out of five companies have seen more email scams since people started working remotely. Almost 70% of businesses think they'll face more cyber problems because so many people work from home now.

Is decentralized Internet the future?

The Internet has come a long way since its invention, and activities on the Internet have become an important part of our daily lives. However, the traditional approach to Internet hosting has remained centralized and the entire technology industry is concerned about the power of data concentrated in the hands of the leading tech companies, including Google, Amazon, Microsoft, etc. Therefore, in the last few years, the decentralization process has become a new trend offering improved security from cybercrimes, privacy, and availability of online services. So, is decentralized Internet the future?

Forward Networks Achieves SOC 2 Type II Compliance, Reiterating Commitment to Data Security and Transparency

Forward Networks announced today that it has successfully achieved System and Organization Controls (SOC) 2 Type II Compliance attestation conducted by an independent third party. The completion of the audit demonstrates Forward Networks' long-term commitment to providing its customers transparency, privacy, and data security. Forward Networks achieved SOC 2 Type I Compliance in July of last year.

CVE-2024-3400: Critical Vulnerability in GlobalProtect Feature of PAN-OS being Actively Exploited

On April 12, 2024, Palo Alto Networks published a security advisory detailing an actively exploited maximum severity vulnerability (CVE-2024-3400, CVSS: 10.0) affecting the GlobalProtect feature of PAN-OS. This vulnerability affects PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls when configurations for both GlobalProtect gateway and device telemetry are enabled. An unauthenticated remote threat actor can exploit this vulnerability to execute arbitrary code with root privileges on the firewall.

CVE-2024-3400: Follow Up: Patches Released for Actively Exploited Critical Vulnerability in GlobalProtect Feature of PAN-OS

On April 14, 2024, Palo Alto Networks (PAN) released hotfixes to address the maximum severity (CVSS: 10) vulnerability, CVE-2024-3400, affecting the GlobalProtect Feature of PAN-OS. An unauthenticated remote threat actor can exploit this vulnerability to execute arbitrary code with root privileges on the firewall. Volexity identified CVE-2024-3400 as a zero-day vulnerability and found that the threat actor UTA0218 was implanting a custom Python backdoor on firewall devices.

Palo Alto Networks Vulnerability: CVE-2024-3400

On April 12th, Palo Alto Networks released a CVE advisory for CVE-2024-3400, a critical vulnerability identified in the GlobalProtect Gateway feature of PAN-OS, the operating system for Palo Alto Networks firewalls. This command injection vulnerability allows unauthenticated attackers to execute arbitrary commands with root privileges on the affected devices.

CVE-2024-3400: Are you at Risk? Find out in Seconds with Forward Enterprise.

Recently, a critical vulnerability, CVE-2024-3400, was discovered in the Palo Alto Networks PAN-OS software, posing a substantial risk to affected systems. In this blog post, we will discuss the nature of this vulnerability and how Forward Networks can assist organizations in swiftly identifying and addressing their risk exposure.

What is DHCP fingerprinting? How does it work and how to configure it in DDI Central?

Network infrastructures in many industries today are challenged by a surge of connected devices, especially as IoTs and BYODs are increasingly popular. The complexity and granularity of managing IP address assignments pose a considerable challenge. Traditional methods of network management often fall short in providing a granular understanding of the devices in use.