This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The problem: Researchers at cybersecurity company Truesec uncovered data that indicated Akira ransomware might be exploiting an old vulnerability within Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD). The vulnerability, CVE-2020-3259 , was first discovered in May 2020. Enabling logging.
One of the suspected FinFly Web servers was active for more than a year between October 2019 and December 2020. As it turned out, it was active for a very short time around September 2020 on a host that appears to have been impersonating the popular Mail.ru The activities peaked in November 2020, but are still ongoing.
For most of the world, 2020 was devastating, a year mired in multiple crises. But in at least one industry, 2020 was a banner year! Most companies were unprepared to secure an entirely remote workforce, relying on remote desktop protocol (RDP) and strained VPN infrastructures, leaving workers ripe for attack.
SASE provides an edge security solution that addresses these challenges without the bottlenecks of traditional virtual private network (VPN) solutions. Bottom Line: Implement SASE to Improve Security and Operations Sprawling organizations with many cloud-based or remote resources will greatly benefit by adopting SASE solutions.
Cloudflare One Cloudflare released their initial SASE offering in October 2020 and continues to add features and capabilities. As companies grow, the strong capabilities of Cloudflare’s higher tiers will facilitate future growth and expansion without compromising security or SASE capabilities.
In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. Tom Tervoort | Principal Security Specialist, Secura. James Coote | Senior Consultant, F-Secure Consulting. Tracks : Network Security, Defense.
553% increase in DNS Flood attacks from 1H 2020 to 2H 2023. CrowdStrike: Observes the top attack vector in 2023 and predicts 2024’s targets: Unmanaged network appliances (edge gateway, firewall, virtual private network/VPN) remain the most observed initial access vector exploited in 2023. 20,551 gambling industry attacks.
As the demand for robust securitydefense grows by the day, the market for cybersecurity technology has exploded, as well as the number of available solutions. The networking pioneer has used its market dominance to move into adjacent markets, among them network security. Cisco (CSCO) is a perennial favorite on this list.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content