Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

How to Evaluate if Your Business Needs a VPN or RDP? What's the Difference?

The need for secure remote access solutions has increased in today's digital era. About two-thirds of businesses have had their data stolen because employees work from home. Four out of five companies have seen more email scams since people started working remotely. Almost 70% of businesses think they'll face more cyber problems because so many people work from home now.

Forward Networks Achieves SOC 2 Type II Compliance, Reiterating Commitment to Data Security and Transparency

Forward Networks announced today that it has successfully achieved System and Organization Controls (SOC) 2 Type II Compliance attestation conducted by an independent third party. The completion of the audit demonstrates Forward Networks' long-term commitment to providing its customers transparency, privacy, and data security. Forward Networks achieved SOC 2 Type I Compliance in July of last year.

Is decentralized Internet the future?

The Internet has come a long way since its invention, and activities on the Internet have become an important part of our daily lives. However, the traditional approach to Internet hosting has remained centralized and the entire technology industry is concerned about the power of data concentrated in the hands of the leading tech companies, including Google, Amazon, Microsoft, etc. Therefore, in the last few years, the decentralization process has become a new trend offering improved security from cybercrimes, privacy, and availability of online services. So, is decentralized Internet the future?

CVE-2024-3400: Critical Vulnerability in GlobalProtect Feature of PAN-OS being Actively Exploited

On April 12, 2024, Palo Alto Networks published a security advisory detailing an actively exploited maximum severity vulnerability (CVE-2024-3400, CVSS: 10.0) affecting the GlobalProtect feature of PAN-OS. This vulnerability affects PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls when configurations for both GlobalProtect gateway and device telemetry are enabled. An unauthenticated remote threat actor can exploit this vulnerability to execute arbitrary code with root privileges on the firewall.

CVE-2024-3400: Follow Up: Patches Released for Actively Exploited Critical Vulnerability in GlobalProtect Feature of PAN-OS

On April 14, 2024, Palo Alto Networks (PAN) released hotfixes to address the maximum severity (CVSS: 10) vulnerability, CVE-2024-3400, affecting the GlobalProtect Feature of PAN-OS. An unauthenticated remote threat actor can exploit this vulnerability to execute arbitrary code with root privileges on the firewall. Volexity identified CVE-2024-3400 as a zero-day vulnerability and found that the threat actor UTA0218 was implanting a custom Python backdoor on firewall devices.

Palo Alto Networks Vulnerability: CVE-2024-3400

On April 12th, Palo Alto Networks released a CVE advisory for CVE-2024-3400, a critical vulnerability identified in the GlobalProtect Gateway feature of PAN-OS, the operating system for Palo Alto Networks firewalls. This command injection vulnerability allows unauthenticated attackers to execute arbitrary commands with root privileges on the affected devices.

What is DHCP fingerprinting? How does it work and how to configure it in DDI Central?

Network infrastructures in many industries today are challenged by a surge of connected devices, especially as IoTs and BYODs are increasingly popular. The complexity and granularity of managing IP address assignments pose a considerable challenge. Traditional methods of network management often fall short in providing a granular understanding of the devices in use.

#DidYouKnow? Rogue Devices are a Threat to Your Network

#DidYouKnow? Rogue devices are a serious threat to your network! It doesn't matter if it's an unauthorized game console an employee added, or hacker plugging into an exposed ethernet port. Knowing what you have and what you should have helps you ensure you take devices off your network that shouldn't be there. #NAC #cybersecurity #rogue #networksecurity

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

A command injection vulnerability has been discovered in the GlobalProtect feature within Palo Alto Networks PAN-OS software for specific versions that have distinct feature configurations that may enable a remote, unauthenticated attacker to execute arbitrary code with root privileges on the firewall. These specific versions require configurations for GlobalProtect gateway and device telemetry enabled.

CVE-2024-3400: What You Need to Know About the Critical PAN-OS Zero-Day

CrowdStrike is constantly working to protect our customers from the newest and most advanced cybersecurity threats. We are actively monitoring activity related to CVE-2024-3400, a critical command injection vulnerability in the GlobalProtect feature of Palo Alto Networks’ PAN-OS software affecting “specific PAN-OS versions and distinct feature configurations,” the vendor says.