What is the Difference Between VPN and Proxy . Even though they handle data in slightly different ways, virtual private networks (VPNs) and proxies [...]
Fortinet Addresses Multiple Vulnerabilities in FortiSandbox, FortiOS, & Other Products Fortinet has released a comprehensive security update addressing numerous vulnerabilities across its product portfolio, with particularly [...]
Threat Actor Allegedly Selling Bruteforcer for Cisco VPN A threat actor has surfaced on underground forums, allegedly offering tools designed to exploit Cisco VPNs via [...]
Researcher Details Fortinet FortiOS Vulnerabilities Allowing DoS & RCE Attacks A security audit of Fortinet’s FortiOS VPN conducted by Akamai researcher Ben Barnea has uncovered [...]
SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild Following PoC Release A critical authentication bypass vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now being [...]
Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as CVE-2025-0108, affecting their [...]
10 Best UTM (Unified Threat Management) Firewalls – 2025 Unified Threat Management (UTM) firewall is a comprehensive cybersecurity solution that integrates multiple security functions into a [...]
Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands A significant zero-day vulnerability in Zyxel CPE series devices, identified as CVE-2024-40891, is being actively exploited by [...]
Critical Palo Alto Firewall Vulnerabilities Let Hackers Bypass Secure Boot & Exploit Firmware A recent cybersecurity report has identified critical vulnerabilities in Palo Alto Networks [...]
SonicWall 0-day Vulnerability Exploited In Attacks Execute Arbitrary OS Commands A critical security vulnerability, tracked as CVE-2025-23006, has been identified in SonicWall’s SMA1000 Appliance Management [...]
