#Google says half of all #zerodays it tracked in #2025 targeted buggy #enterprise tech
Google said security and networking devices, #firewalls, #VPN and #virtualization platforms like Ivanti and VMware, were among targetes last year. All four of the companies said hackers have exploited their products on customer networks in recent months.
The remaining 52% of #zeroday bugs were found in consumer and end-user products, such as those made by Microsoft, Google, and Apple
https://techcrunch.com/2026/03/05/google-says-half-of-all-zero-days-it-tracked-in-2025-targeted-buggy-enterprise-tech/
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Enterprise software was a major focus of zero-day activity during 2025, with security and networking devices, like firewalls, VPNs, and virtualization platforms among the most targeted by malicious hackers.

TechCrunch
CAPTCHA check

ayuda #fediverso #redes #seguridad #firewalls

estoy montando un #cluster #proxmox #hibrido un nodo en casa otro en la #nube

tengo muy poca puta idea de firewalls. hasta la fecha, ponia uno en el edge, que bloqueara todo lo feo, y adentro, todo abierto. y aparte de eso, el concepto de un firewall cliente, un firewall servidor

pero me estoy liando que flipas con proxmox. uno a nivel de datacenter. uno a nivel de nodo. uno a nivel de contenedor e incluso puedes activar desactivar por cada tarjeta de red? me estoy volviendo loco. tengo entendido, muy a grandes rasgos que: desde lo mas exterior, hay que bloquear todo salvo los puertos web y VPN. desde lo mas cercano: el contenedor, bloquear todo salvo la actividad de la aplicacion en si, sea la que sea. y en medio, capas inter nodo: la comunicacion entre nodo y contenedores. pero seguramente haya formas mas precisas y correctas de hacerlo. he estudiado esto... un par de horas ayer. no exagero.

me puede alguien ayudar por favor, en guiarme en lograr lo siguiente?

quiero que el cluster pueda comunicar de forma interna (vpn) y externa, exponiendo por netbird.

pensaba tener una vlan 10.0.10.1/24 para interno y 10.0.20.1/24 para exponer

la idea es que la comunicacion interna sea mas laxa, y que al contrario la 20 sea full estricta

en el nodo nube, solo tengo una tarjeta fisica de red con una ip publica.

por ahora lo que tengo hecho es hacer un bridge vlan aware, y de ahi 3 vlans (quiero una para netbird y otra para tailscale. por si se cae una, no quedarme fuera)

tengo forward NAT de la ip publica al bridge

cuando literal, no tengo internet en los contenedores... en el mejor de los casos, no son accesibles los puertos que quiero, el 80 y 443, para desplegar netbird.

y ahi estoy bloqueado.
no hay puta forma de pasar de ese tercer pantallazo.

@t3rr0rz0n3 @z3r0

que estoy haciendo mal? seguramente de mucho a todo. como dije, hasta ahora mis redes eran muy.... libres. y es literal mi primer cluster hibrido y la primera vez que trasteo con vlans.

se agradece mucho #boost

Batten down the hatches - ransomware attacks are increasingly targeting firewalls, experts claim
Batten down the hatches - ransomware attacks are increasingly targeting firewalls, experts claim
#Firewalls #Ransomwareattacks

https://opr.news/7c45bcd7260219en_us?link=1&client=ex_global

Download Now
https://opr.as/share

Batten down the hatches - ransomware attacks are increasingly targeting firewalls, experts claim

Make sure to secure your firewalls Firewalls are a common target for hackers, report claims Barracuda report finds 90% of all ransomware incidents in 2025 exploited firewalls Some flaws were more than a decade old, so patch now If you can secure just one device on your network today - make sure it’s the firewall, as a new report from Barracuda claims almost all ransomware incidents start with a compromised firewall instance.

opera news app
@fboldog @hyc @markhurst @pluralistic interesting, nice that #HLS even has an #RFC, #RFC8216. I've always been wondering why #RTP, which has had many RFCs for decades never got that popular.
Is it mainly because of company and university #firewalls blocking UDP? So we now start to reimplement everything on HTTP(s)?
If only #IPSec, so encryption on layer 3 already instead, had gotten more traction and would be more easy to use...

Blocking Empty UA Outside of Feed Requests

I wanted to add an htaccess rule to NLJ blocking requests from empty user agents (and "-" user agengs). I looked into the best way to do it and found a 2017 answer on Stack Overflow. This solution is interesting because it explicitly allows requests to the site's feed. While I have not noticed empty user agent requests for our feeds, there are many niche feed readers out there, so I went with a modified version of this snippet to be on the safe side.

https://social.emucafe.org/naferrell/blocking-empty-ua-outside-feed-02-04-26/

[Note] Blocking Empty UA Outside of Feed Requests

I borrowed a solution from a Stack Overflow answer for blocking requests from empty UA in my WordPress site’s .htaccess file, exempting requests for feed.

The Emu Café Social

Using Cloudron’s IP Firewall

This site is hosted on the same server as The New Leaf Journal, and I use Cloudron to manage the server. Beginning around early spring last year, The New Leaf Journal began to crash once every few days when Cloudron health checks failed (I have not had any similar issues with this site, which is much lower traffic). I attributed the problems to bot traffic, and I think I was correct to do so. I tried many fixes, some of which worked for a time before the downtime problems returned. After […]

https://social.emucafe.org/naferrell/using-cloudrons-ip-firewall-01-30-26/

Oh, I suppose I have been slacking and not telling you that if you order The Book of PF, 4th ed https://nostarch.com/book-of-pf-4th-edition now, you will get the *final version* ebook (print is still in progress) #bookofpf #openbsd #freebsd #networking #firewalls #pf #networktrickery #freesoftware #libresoftware @nostarch

Also see https://nxdomain.no/~peter/yes_the_book_of_pf_4th_ed_is_coming.html

The Book of PF, 4th Edition

Build a more secure network with PF.

🇫🇷 Fortinet : une #faille mal bouchée déclenche une vague de cyberattaques contre des entreprises
https://www.numerama.com/cyberguerre/2165471-une-faille-mal-bouchee-declenche-une-vague-dattaques-automatisees-contre-des-entreprises.html

🇬🇧 #Fortinet #Firewalls Hit With Malicious Configuration Changes. Automated infections of potentially fully patched #FortiGate devices are allowing threat actors to steal firewall configuration files.
https://www.darkreading.com/cloud-security/fortinet-firewalls-malicious-configuration-changes
#sécurité #security

Piratage Fortinet FortiGate : désactivez le SSO pour éviter l'intrusion

Les pare-feu Fortinet FortiGate, déployés dans des milliers d’entreprises et d’administrations à travers le monde, sont actuellement la cible d’une vaste campagne de cyberattaques automatisées. Ce qui inquiète particulièrement l’écosystème cyber : des correctifs avaient déjà été publiés pour contrer ce type

Numerama

@distrowatch I faced ddos from all sorts of bots couple of months back when I started with a search engine. I ended up blocking 10K or so bots. If you want you can use it for your blocking/iptables/firewall: https://git.flossboxin.org.in/vdbhb59/hosts/src/branch/main/bots.txt

There maybe few false positives which I can delete if I am made aware of.
Hope it will help. #botsblocking #hosts #firewalls

hosts/bots.txt at main

hosts - https://host.flossboxin.org.in

FbIN Forgejo: Self-Hosted