article thumbnail

Chinese national charged for hacking thousands of Sophos firewalls

Security Affairs

has charged a Chinese national for hacking thousands of Sophos firewall devices worldwide in 2020. has charged the Chinese national Guan Tianfeng (aka gbigmao and gxiaomao) for hacking thousands of Sophos firewall devices worldwide in 2020. It was designed to download payloads intended to exfiltrate XG Firewall-resident data.

article thumbnail

Automate your Cisco Secure Firewall deployment

Cisco Security

I nfrastructure as a Code (IaC) and Automation are now common requests from our customers deploying Cisco Secure Firewalls. Our response to this trend is making Cisco Secure Firewall deployable as a code utilizing new IaC templates , which we are happy to announce! To learn more: Virtual Firewalls for Public Cloud.

Firewall 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing new cloud resources page for Cisco Secure Firewall

Cisco Security

To help our customers and partners, we have centralized all our cloud & automation resources for Secure Firewall into a single page: [link]. More than 70 scripts, videos, blogs and documentation are available. Our new page is organized by cloud provider and specific use case to easily deploy Secure Firewall.

Firewall 144
article thumbnail

U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

Cisco warned customers of password-spraying attacks that have been targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices. The company published a document containing recommendations against password spray attacks aimed at Remote Access VPN (RAVPN) services.

VPN 111
article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

Firewall 116
article thumbnail

Top 12 Firewall Best Practices to Optimize Network Security

eSecurity Planet

Firewalls monitor and control incoming and outgoing traffic while also preventing unauthorized access. Configurations, network diagrams, and security rules should be documented for future reference and auditing. Overlapping rules may impair firewall efficiency or expose flaws that allow attackers to circumvent regulations.

Firewall 122
article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

A firewall policy is a set of rules and standards designed to control network traffic between an organization’s internal network and the internet. Featured Partners: Next-Gen Firewall (NGFW) Software Learn more Table of Contents Toggle Free Firewall Policy Template What Are the Components of Firewall Policies?

Firewall 110