Did you know a cyberattack occurs every 39 seconds? 🚨 With attacks surging by 75% in 2024, even a small firewall misconfiguration can cause a massive data breach. Mastering leading firewall technologies like Fortinet, Palo Alto, Cisco ASA, and Firepower is no longer optional—it's essential. Dive into the complete training guide 👉 https://www.networkbulls.com/blog/the-ultimate-firewall-training-guide-fortinet-palo-alto-cisco-asa-and-cisco-firepower/

#FirewallSecurity #CyberSecurityTraining #NetworkSecurity #ITSkills

Fortinet FortiGate admins are observing exploitation patterns consistent with CVE-2025-59718 even on patched systems, suggesting incomplete mitigation in earlier updates.

Reports include SSO-based admin creation and activity aligned with previously documented attacks. Additional FortiOS releases are expected.

The situation reinforces the need for defense-in-depth around identity, logging, and privileged access.

Source: https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/

Follow @technadu for neutral, operationally focused security reporting.

#Infosec #Fortinet #FirewallSecurity #IAM #VulnerabilityManagement #TechNadu

The Sony PlayStation hack of 2011 is considered the worst breach in gaming history. With 77 million users affected, this episode is often used as an example of the importance of timely patching of servers and firewall security.
Here's what happened and the lessons learnt.

#serverSecurity #patchDay #firewallSecurity #PSNhack #PlayStation #gaming

https://negativepid.blog/the-sony-playstation-network-hack/
https://negativepid.blog/the-sony-playstation-network-hack/

The Sony PlayStation Network Hack - Negative PID

On April 17, 2011, the PlayStation Network (PSN) went down, leaving users without access to the platform for twenty-three days. It affected 77M users.

Negative PID

A critical flaw in WatchGuard Firebox firewalls could let hackers remotely take control—one overlooked bug may expose your entire network. Are your defenses up to date? Read the details.

https://thedefendopsdiaries.com/critical-watchguard-firebox-vulnerability-cve-2025-9242-highlights-urgency-of-proactive-firewall-security/

#watchguard
#firewallsecurity
#cve20259242
#vulnerabilitymanagement
#patching
#remotecodeexecution
#cybersecurity
#networksecurity
#ransomware

Cisco's firewall may have a secret opening—an RCE flaw in its RADIUS system lets attackers run commands remotely if left unpatched. Curious about how this could jeopardize your network security?

https://thedefendopsdiaries.com/understanding-and-mitigating-the-rce-vulnerability-in-ciscos-secure-firewall-management-center/

#cisco
#firewallsecurity
#rce
#cybersecurity
#networksecurity

Understanding and Mitigating the RCE Vulnerability in Cisco's Secure Firewall Management Center

Learn about the critical RCE vulnerability in Cisco's Firewall Management Center and how to mitigate it effectively.

The DefendOps Diaries

https://www.youtube.com/watch?v=rVPDEzcW8Qc

New in SecPoint® Protector V66 – Smarter RBL System!
Our latest update introduces automatic detection and removal of inactive RBLs to keep your anti-spam filtering lean, fast, and accurate.

✅ Auto-disables non-responsive RBLs
✅ Boosts spam filtering performance
✅ Speeds up mail processing
✅ Reduces false positives

#CyberSecurity #SecPoint #SecPointProtector #EmailSecurity #RBL #AntiSpam #FirewallSecurity #UTMFirewall #SecPointProtector #CyberDefense #ITSecurity

SecPoint Protector V66 UTM Firewall RBL System Status

YouTube
Importance of OT Security and Why It's Matters?

Operational Technology (OT) security is becoming crucial. It plays a critical role in protecting industrial and infrastructure systems.

TekGinger

While I am at it anyway; #Phishing meets #SMB: Exploiting network trust to capture #NTLM hashes (#pentesting fun)

One effective phishing method leverages SMB connections to capture #NetNTLM hashes for offline #cracking, providing attackers with credentials for the next phase (for example social engineering or other tech attacks). Oh; BIT B.V. (bit.nl) did send my a set of abuse mails, … sorry 😆 … but very nice and thx 🙏🏼, anyway;

Exploit Path: Initial Phishing Vector: The attack starts with a phishing email or download website or something something, containing a payload (e.g., a malicious document or shortcut file, whatever, choose your poison).

The payload initiates an SMB request to the attacker-controlled server (`\\<C2IP>\share`), tricking the victim’s system into authenticating with it. Modern browsers like edge won’t fly; you need to get a bit more creative to execute this and no it’s not a hyperlink. Think Java. Or macro (although; meh).

Then we have SMB Request Redirection: Tools like Responder on the attacker’s C2 server capture NetNTLMv2 hashes during these authentication attempts. This works over IPv4 and IPv6, with IPv6 often prioritized in networks and less monitored. Hence #mitm6. But that’s another story.

Captured hashes are cracked offline using tools like #Hashcat, potentially giving credentials for further attacks. It’s also an excuse for my new RTX 5090 card. 😉

Observations from recent penetration tests where I executed this attack;

-Firewall Rules: not excisting … at all. 🥹
Many environments have outbound 'any-any' rules on firewalls, even on critical nets like Citrix farms. This unrestricted outbound traffic allows SMB authentication requests to reach attacker-controlled servers on the internet. And there is something with remote workers and open internet access lately…
-#Azure and #2FA Gaps, here we go again (see https://lnkd.in/g2ctMEDG); 2FA exclusions are another common issue:
- Trusted locations (e.g., `192.168.x.x` or specific IP ranges) configured to bypass 2FA/MFA.. intended to improve usability, such exclusions can be exploited once an attacker gains access to these "trusted" locations; simply put a VM inside a 192.168 range and chances are…. Good.

These misconfigurations reduce the effectiveness of otherwise robust security measures like MFA and firewall segmentation, giving attackers unnecessary opportunities.

The Takeaway: Attackers thrive on overlooked gaps in configuration. Whether it's outbound "any-any" firewall rules or MFA bypasses for trusted locations, these lapses provide unnecessary pathways for compromise. By combining phishing, SMB exploitation, and tools like Responder, we can target foundational weaknesses in even hybrid environments. I’ve seen soc’s only respond after mission target; because most are monitoring just on the endpoint (EDR/XDR), poorly.

#CyberSecurity #Phishing #SMB #NTLM #MFA #FirewallSecurity #infosec

The meme is absolutely intended as shitposting. Sorry 🤣

Henk-Jan Angerman on LinkedIn: #aitm #entra #mfa #entraid #2fa #microsoft #microsoft #entra #metaverse…

Combining a good write up in #aitm and #entra and recent real-world-attack scenarios. Moving forward on my previous post tabout legacy #MFA (debatable, again……

💡 Did you know that SQL injections remain one of the top vulnerabilities in web applications? Cisco’s October 2024 Security Advisory highlights critical flaws that can lead to unauthorized data access and system modification.

What’s your best practice for protecting against SQL injection attacks? Let’s share strategies!

Learn more about these vulnerabilities and how to secure your systems in our latest post: https://guardiansofcyber.com/cybersecurity-news/cisco-oct-2024-advisory/

#Cybersecurity #SQLInjection #DataProtection #GuardiansOfCyber #FirewallSecurity #VPN #InfoSec #CybersecurityTips #Cisco #Guardians

🚨 Did you know 37% of organizations struggle to detect threats hidden in encrypted traffic? 🚨 In today’s multi-cloud world, having the right Firewall Security Manager is essential for staying secure and compliant.

💡 A centralized firewall management tool can streamline security policies, automate compliance checks, and improve visibility across your cloud infrastructure.

🌐 How do you manage your network's security policies? Share your thoughts and tips!

Check out our full guide here: https://guardiansofcyber.com/solutions-best-practices/firewall-security-manager-how-to-choose-best-guide/

#Cybersecurity #FirewallSecurity #GuardiansOfCyber #DataProtection #CloudSecurity #ThreatDetection #Compliance #MultiCloud #SecurityManagement