Tag: firewall
-
‘Critical’ WatchGuard Firebox Vulnerability Exploited In Attacks
A critical-severity vulnerability impacting customers of WatchGuard’s next-generation firewall, Firebox, has seen exploitation in cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed Friday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cisa-critical-watchguard-firebox-vulnerability-exploited-in-attacks
-
WatchGuard sounds alarm as critical Firebox flaw comes under active attack
Newly disclosed vulnerability already being abused, users urged to lock down exposed firewalls First seen on theregister.com Jump to article: www.theregister.com/2025/12/19/watchguard_firebox/
-
New critical WatchGuard Firebox firewall flaw exploited in attacks
WatchGuard has warned customers to patch a critical, actively exploited remote code execution (RCE) vulnerability in its Firebox firewalls. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/
-
WatchGuard Zero-Day Actively Exploited to Seize Control of Firewalls
WatchGuard has issued an urgent warning regarding a critical zero-day vulnerability in its Firebox firewall appliances that is currently being exploited in the wild. The flaw, tracked as CVE-2025-14733, allows remote attackers to seize control of affected devices without needing any authentication. Technical Details and Impact The vulnerability is an Out-of-Bounds Write flaw located in the iked process, which handles…
-
Der Raspberry-Pi-Weckruf für CISOs
Tags: access, authentication, ceo, ciso, control, cyberattack, dns, firewall, group, hacker, Hardware, infrastructure, linux, monitoring, office, risk, switch, tool, voip, vpnKleines Device, große Wirkung.Mitte Dezember wurde eine Fähre in Besitz der Mediterranean Shipping Company über Stunden in einem französischen Hafen festgesetzt, wie Bloomberg berichtete. Der Grund: Es bestand der Verdacht, dass russische Cyberkriminelle versucht haben, das Netzwerk des Schiffs zu hacken mit einem Raspberry Pi. Dieser war demnach mit einem Mobilfunkmodem gekoppelt, das den Fernzugriff…
-
Cisco confirms zero-day exploitation of Secure Email products
Rebuild guidance and operational tradeoffs: Cisco has said that wiping and rebuilding appliances is currently required in cases where compromise has been confirmed.”From a security standpoint, it is indeed the right call,” Tyagi said. “When there’s a risk that attackers have embedded themselves deep in a system, patching alone won’t solve the issue. Rebuilding is…
-
Cisco confirms zero-day exploitation of Secure Email products
Rebuild guidance and operational tradeoffs: Cisco has said that wiping and rebuilding appliances is currently required in cases where compromise has been confirmed.”From a security standpoint, it is indeed the right call,” Tyagi said. “When there’s a risk that attackers have embedded themselves deep in a system, patching alone won’t solve the issue. Rebuilding is…
-
More than half of public vulnerabilities bypass leading WAFs
Miggo Security has released a new report that examines how web application firewalls are used across real-world security programs. The research outlines the role WAFs play as … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/miggo-research-waf-vulnerability-bypass/
-
More than half of public vulnerabilities bypass leading WAFs
Miggo Security has released a new report that examines how web application firewalls are used across real-world security programs. The research outlines the role WAFs play as … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/18/miggo-research-waf-vulnerability-bypass/
-
Industrial routers bear the brunt of OT cyberattacks, new Forescout research finds
Industrial routers and other OT perimeter devices are absorbing the majority of cyberattacks targeting operational technology environments, according to new Forescout Vedere Labs research. Analysing 90 days of real-world honeypot data, researchers found that 67% of malicious activity was directed at OT perimeter devices, such as industrial routers and firewalls, compared with 33% aimed at…
-
New Reports Reveal WAFs Are Ineffective Against Latest React2Shell Exploit
TEL AVIV, Israel, Dec. 17, 2025 Miggo Security has released a comprehensive benchmark study revealing critical gaps in Web Application Firewall (WAF) protection, with the discovery of React2Shell (CVE-2025-55182) serving as a stark real-world validation of these vulnerabilities. The research, titled >>Beat the Bypass: A Benchmark Study of WAF Weaknesses and AI Mitigation,
-
CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited
Tags: access, advisory, attack, authentication, control, cve, cyber, data, exploit, firewall, flaw, injection, international, mobile, ransomware, sql, vulnerability, zero-dayA zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006. Key takeaways: CVE-2025-40602 is a local privilege escalation vulnerability in the appliance management console (AMC) of the SonicWall SMA 1000 appliance. CVE-2025-40602 has been exploited in a chained attack with CVE-2025-23006, a deserialization…
-
‘Ink Dragon’ threat group targets IIS servers to build stealthy global network
Tags: access, attack, china, control, credentials, data, exploit, firewall, government, group, infrastructure, intelligence, microsoft, network, office, threat, vulnerability, wafmodus operandi to several other Chinese threat groups engaged in nation-state surveillance, such as UNC6384, whose campaigns targeted European diplomats.However, during a recent investigation at the office of a European government, Check Point said it had discovered that the group has now pivoted towards what it called “an unusually sophisticated playbook” with longer term goals.Key…
-
Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)
Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/17/fortigate-vulnerability-cve-2025-59718-exploited/
-
Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)
Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/17/fortigate-vulnerability-cve-2025-59718-exploited/
-
FortiGate firewall credentials being stolen after vulnerabilities discovered
Tags: access, advisory, ai, attack, authentication, best-practice, breach, ceo, cisa, credentials, cve, cyberattack, cybersecurity, data, data-breach, exploit, firewall, flaw, fortinet, hacker, infrastructure, Internet, kev, least-privilege, login, malicious, network, password, software, theft, threat, update, vulnerabilityCSO. “So far, the pattern of activity has appeared to be opportunistic in nature. While it is difficult to estimate the number of devices directly vulnerable to this vulnerability, there are hundreds of thousands of Fortinet appliances accessible on the public internet through specialized search engines. This allows threat actors to opportunistically attempt exploitation against…
-
Real Attacks of the Week: How Spyware Beaconing and Exploit Probing Are Shaping Modern Intrusions
Over the past week, enterprise security teams observed a combination of covert malware communication attempts and aggressive probing of publicly exposed infrastructure. These incidents, detected across firewall and endpoint security layers, demonstrate how modern cyber attackers operate simultaneously. While quietly activating compromised internal systems, they also relentlessly scan external services for exploitable weaknesses. Although the…
-
Product showcase: GlassWire mobile firewall for Android
GlassWire is a free network monitoring and security application for Windows and Android. It lets you see how your system communicates over the internet and local network. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/16/product-showcase-glasswire-firewall-android/
-
Identity Risk Is Now the Front Door to Enterprise Breaches (and How Digital Risk Protection Stops It Early)
Most enterprise breaches no longer begin with a firewall failure or a missed patch. They begin with an exposed identity. Credentials harvested from infostealers. Employee logins are sold on criminal forums. Executive personas impersonated to trigger wire fraud. Customer identities stitched together from scattered exposures. The modern breach path is identity-first, and that shift… First…
-
Windows Defender Firewall Flaw Allows Attackers to Access Sensitive Data
Microsoft has officially addressed a new security vulnerability affecting the Windows Defender Firewall Service that could allow threat actors to access sensitive information on compromised systems. The flaw, identified as CVE-2025-62468, was disclosed as part of the company’s December 2025 security updates. This information disclosure vulnerability poses a risk to organizations that rely on standard…
-
Windows Defender Firewall Flaw Allows Attackers to Access Sensitive Data
Microsoft has officially addressed a new security vulnerability affecting the Windows Defender Firewall Service that could allow threat actors to access sensitive information on compromised systems. The flaw, identified as CVE-2025-62468, was disclosed as part of the company’s December 2025 security updates. This information disclosure vulnerability poses a risk to organizations that rely on standard…
-
Rack-Firewall für den universellen Einsatzzweck
Die neue Firewall Lancom-R&S-UF-560 Lancom Systems erweitert das etablierte Rack-Firewall-Portfolio mit einem Mittelklasse-Modell optimiert für mittelständische Unternehmen und öffentliche Auftraggeber. Damit bietet die Rack-Modellreihe der Lancom-R&S-Unified-Firewalls eine komplette Abdeckung aller Rack-Firewalle, von Einstieg bis Enterprise. Im November 2025 hat die Digitalministerkonferenz (DMK) in Berlin richtungsweisende Beschlüsse zur digitalen Zukunft Deutschlands und Europas gefasst. Das […]…
-
Rack-Firewall für den universellen Einsatzzweck
Die neue Firewall Lancom-R&S-UF-560 Lancom Systems erweitert das etablierte Rack-Firewall-Portfolio mit einem Mittelklasse-Modell optimiert für mittelständische Unternehmen und öffentliche Auftraggeber. Damit bietet die Rack-Modellreihe der Lancom-R&S-Unified-Firewalls eine komplette Abdeckung aller Rack-Firewalle, von Einstieg bis Enterprise. Im November 2025 hat die Digitalministerkonferenz (DMK) in Berlin richtungsweisende Beschlüsse zur digitalen Zukunft Deutschlands und Europas gefasst. Das […]…
-
Mit der Firewall v22 festigt Sophos sein ‘Secure by Design”-Versprechen
Sophos hat die Veröffentlichung der Sophos-Firewall v22 bekannt gegeben. Das Update erweitert das ‘Secure by Design”-Versprechen des Unternehmens um eine neue Integritätsprüfung und zahlreiche weitere Sicherheitsverbesserungen, darunter ein gehärteter Kernel, Remote-Integritätsüberwachung, verbesserte Workload-Isolation und eine optimierte Anti-Malware-Engine. ‘Wir investieren kontinuierlich in die Implementierung der “šSecure by Design’-Prinzipien in all unsere Produkte”, so Ross McKerchar, CISO…

