Topic: network security

  • OPNsense 26.1: Major Updates for Open-Source Firewall

    OPNsense 26.1: Major Updates for Open-Source Firewall

    OPNsense 26.1, "Witty Woodpecker," introduces major enhancements to firewall management, including a redesigned rules interface and expanded API coverage for deeper automation and programmability. The update adds new threat intelligence and asset visibility features, such as optional Q-Feeds for ...

    Read More »
  • Wi-Fi Security: The New Focus on Access Control

    Wi-Fi Security: The New Focus on Access Control

    The rapid expansion of Wi-Fi networks is shifting enterprise security priorities toward robust **access control and identity management**, moving beyond basic connectivity to secure user data and ensure trusted access. **Wi-Fi 7 adoption is accelerating** due to its superior performance, which su...

    Read More »
  • Check If Your Home Network Is Hacked

    Check If Your Home Network Is Hacked

    A new tool called IP Check from GreyNoise allows users to quickly see if their public IP address has been flagged for malicious activity, such as being part of a botnet, providing an essential proactive security check. Compromised home networks can be hijacked to route harmful traffic for attacks...

    Read More »
  • Detect Malicious Traffic with Maltrail: Open-Source Security Tool

    Detect Malicious Traffic with Maltrail: Open-Source Security Tool

    Maltrail is an open-source cybersecurity tool that detects malicious network traffic by comparing data against public blacklists of known threats like domains, IPs, and URLs. Its architecture uses sensors to monitor network traffic and send alerts to a central server, which logs events and suppor...

    Read More »
  • How Attackers Weaponize Communication Networks

    How Attackers Weaponize Communication Networks

    Communication networks are now the primary target for cyber attackers, offering vast data access for espionage, financial crime, and other malicious intents. Attackers exploit built-in network tools and lawful intercept systems to passively monitor and steal credentials, enabling large-scale surv...

    Read More »
  • Nevada State Offices Shut Down by Major Network Security Incident

    Nevada State Offices Shut Down by Major Network Security Incident

    A major network security incident has forced Nevada state government offices to close and disrupted digital services, with recovery efforts ongoing. State offices have suspended in-person services and residents should expect intermittent outages, though no timeline for full restoration has been p...

    Read More »
  • FCC to Roll Back ISP Cybersecurity Mandate

    FCC to Roll Back ISP Cybersecurity Mandate

    The FCC is reversing a cybersecurity mandate for internet providers after industry lobbying, with Chairman Brendan Carr arguing it overstepped legal authority and that companies have already improved security voluntarily. The original 2025 ruling responded to state-sponsored cyberattacks like Chi...

    Read More »
  • Huawei Debuts AI-Driven Resilient Network Solution at GITEX 2025

    Huawei Debuts AI-Driven Resilient Network Solution at GITEX 2025

    Huawei launched its Enterprise Network Integration Service 6.0 at GITEX Global 2025, designed to help organizations build resilient, secure, and intelligent network systems with full lifecycle support from design to optimization. The solution delivers industry-specific benefits, including 99.999%...

    Read More »
  • Bitdefender & NETGEAR: Rising Home Cybersecurity Threats

    Bitdefender & NETGEAR: Rising Home Cybersecurity Threats

    Modern homes face nearly triple the daily cybersecurity attacks compared to last year, with households averaging 22 connected devices and enduring about 29 attacks daily. Entertainment devices like streaming systems, smart TVs, and IP cameras are the most vulnerable, often unpatched and accountin...

    Read More »
  • Enigma AI Secures Asset-to-Asset Communication with Trust Governance

    Enigma AI Secures Asset-to-Asset Communication with Trust Governance

    Enigma Networks has launched Enigma AI, a platform designed to systematically govern and validate internal asset-to-asset communications, moving beyond detection to enforce zero trust principles within enterprise networks. The platform addresses a critical security gap where over-permissive inter...

    Read More »
  • Critical RCE flaw in Zyxel routers puts users at risk

    Critical RCE flaw in Zyxel routers puts users at risk

    A critical command injection vulnerability (CVE-2025-13942) in Zyxel devices allows remote code execution, but exploitation requires both UPnP and WAN access to be enabled, with WAN disabled by default. Zyxel has released firmware patches for this and other high-severity flaws, while also confirm...

    Read More »
  • Ditch Your Router's USB Port: What Tech Pros Use Instead

    Ditch Your Router's USB Port: What Tech Pros Use Instead

    Security experts strongly advise against using a router's USB port due to outdated, insecure protocols like FTP and SMBv1, which can expose your network to data breaches and unauthorized access. Using a router's USB port for file sharing often degrades network performance, causing slower internet...

    Read More »
  • Extreme Unleashes Wi-Fi 7: Faster, Smarter, Secure Global Connectivity

    Extreme Unleashes Wi-Fi 7: Faster, Smarter, Secure Global Connectivity

    Extreme Networks' Wi-Fi 7 solutions deliver faster speeds, greater reliability, and enhanced efficiency, benefiting diverse organizations like universities, healthcare providers, and entertainment venues. Key features include dual IoT radios, PoE failover, and always-on encryption, which reduce e...

    Read More »
  • Bitdefender & NETGEAR: Rising Threats to Your Connected Home

    Bitdefender & NETGEAR: Rising Threats to Your Connected Home

    The average household now contains 22 connected devices and faces nearly 29 daily cyberattacks, a nearly threefold increase from the previous year, highlighting the growing threat to smart homes. Entertainment devices like streaming gadgets, smart TVs, and IP cameras are the most vulnerable, ofte...

    Read More »
  • Henkel CISO: The Messy Reality of Legacy Factory Monitoring

    Henkel CISO: The Messy Reality of Legacy Factory Monitoring

    Modern smart factories face unique cybersecurity risks due to the convergence of legacy equipment and cloud platforms, requiring comprehensive visibility, local autonomy, and strict vendor accountability to build resilience. A critical vulnerability is the over-reliance on single points of failur...

    Read More »
  • Critical Flaws Exposed in Smart Air Compressor

    Critical Flaws Exposed in Smart Air Compressor

    Smart air compressors like the CAT-10020SMHAD with MDR2i controllers offer digital convenience but introduce cybersecurity risks, including vulnerabilities that could disrupt operations or manipulate data. Security flaws identified include hardcoded Wi-Fi passwords, unencrypted HTTP communication...

    Read More »
  • Webinar: How Stolen Credentials Threaten Your Network Security

    Webinar: How Stolen Credentials Threaten Your Network Security

    Cybercriminals increasingly use stolen credentials to bypass complex hacking methods, making identity security a top priority, as highlighted in an upcoming July 9th webinar by cybersecurity experts. The webinar will explore credential-based attacks, including infostealer malware and tactics like...

    Read More »
  • Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced EDR Tamper Protection, to proactively address critical security gaps. The Network Share Protection blocks ransomware encryption at...

    Read More »
  • Top Black Friday 2025 Cybersecurity Deals to Secure

    Top Black Friday 2025 Cybersecurity Deals to Secure

    Black Friday 2025 offers significant discounts on cybersecurity tools, making enterprise-grade protection more affordable for businesses to secure their systems and data. Featured products include Passwork for password management, NordLayer for network security, NordPass for credential management...

    Read More »
  • Infoblox Hits 200 Customers, Unveils New Network Transformation Tools

    Infoblox Hits 200 Customers, Unveils New Network Transformation Tools

    Over 200 organizations now use Infoblox's Universal DDI Product Suite to modernize network infrastructure, addressing the need for unified solutions in hybrid and multi-cloud environments. The platform integrates essential network services into a single SaaS management plane, reducing manual task...

    Read More »
  • Urgent: Actively Exploited WSUS Bug Now on CISA KEV List

    Urgent: Actively Exploited WSUS Bug Now on CISA KEV List

    A critical security flaw (CVE-2025-59287) in Windows Server Update Services (WSUS) allows unauthenticated attackers to execute remote code with system privileges by exploiting the GetCookie() endpoint. The vulnerability is under active exploitation, prompting urgent patching by Microsoft and incl...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: October 2025

    Top Cybersecurity Jobs Hiring Now: October 2025

    The cybersecurity job market is robust, offering diverse opportunities globally for professionals at all levels to help companies strengthen defenses against evolving threats. Current openings span various roles and locations, including remote, on-site, and hybrid positions, such as Cyber Securit...

    Read More »
  • F5 Hack Puts Thousands of Networks at Imminent Risk

    F5 Hack Puts Thousands of Networks at Imminent Risk

    A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...

    Read More »
  • Critical DrayTek Router Flaw Allows Remote Code Execution

    Critical DrayTek Router Flaw Allows Remote Code Execution

    A critical vulnerability (CVE-2025-10547) in DrayTek routers allows unauthenticated remote attackers to execute commands via crafted HTTP/HTTPS requests, potentially leading to system crashes or code execution. DrayTek has released firmware updates for 35 router models and advises immediate insta...

    Read More »
  • Unify DNS, DHCP, IPAM & Security with BlueCat Horizon

    Unify DNS, DHCP, IPAM & Security with BlueCat Horizon

    BlueCat Horizon is a unified SaaS platform that integrates DNS, DHCP, IPAM, and security to provide consistent governance and real-time network adaptation without requiring infrastructure replacement. It is designed for hybrid environments, allowing companies to leverage existing investments whil...

    Read More »
  • US agencies urged to patch Cisco firewalls amid active attacks

    US agencies urged to patch Cisco firewalls amid active attacks

    U.S. federal agencies must immediately patch vulnerable Cisco firewalls due to active exploitation of security flaws in Cisco ASA software by sophisticated threat actors. CISA's emergency directive highlights that many federal systems remain unpatched, risking critical infrastructure and sensitiv...

    Read More »
  • Powering the Gulf's Next Connectivity Revolution

    Powering the Gulf's Next Connectivity Revolution

    The Gulf region is rapidly becoming a digital innovation hub, with advanced private networks and AI transforming key industries like oil and gas, logistics, and manufacturing, moving beyond traditional telecommunications services. Ericsson is driving this shift by focusing on technologies such as...

    Read More »
  • CISA Mandates Federal Agencies Replace Outdated Edge Devices

    CISA Mandates Federal Agencies Replace Outdated Edge Devices

    The U.S. CISA has issued a binding directive (BOD 26-02) requiring federal agencies to identify and replace outdated, unsupported networking edge devices, which are prime targets for cyberattacks. Agencies must follow a strict timeline, including creating an inventory within three months, replaci...

    Read More »
  • Microsoft Fixes Critical WSUS Flaw Under Active Attack

    Microsoft Fixes Critical WSUS Flaw Under Active Attack

    Microsoft has released an emergency patch for a critical, actively exploited vulnerability (CVE-2025-59287) in Windows Server Update Services, allowing unauthorized remote code execution without user interaction. The flaw is wormable and could enable attackers to take control of WSUS servers, pot...

    Read More »
  • Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland has partnered with Macquarie Telecom to enhance its IT infrastructure, enabling the charity to focus more resources on cancer research, prevention, and patient care. The partnership includes a secure SD-WAN and SASE framework, along with cybersecurity upgrades like SOC a...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: December 2025

    Top Cybersecurity Jobs Hiring Now: December 2025

    The cybersecurity field offers diverse, in-demand career paths globally, with organizations actively seeking talent for roles ranging from threat intelligence to cloud security architecture. Specific high-demand roles include threat intelligence analysts, security managers, architects, and engine...

    Read More »
  • Top Cybersecurity Jobs Hiring Now | November 2025

    Top Cybersecurity Jobs Hiring Now | November 2025

    The cybersecurity job market offers diverse, high-impact roles globally, from leadership to technical positions, aimed at protecting organizations' digital assets. Key roles include strategic leadership like CISOs defining security roadmaps and technical engineers managing security platforms and ...

    Read More »
  • WorldLeaks Ransomware Unleashes New 'RustyRocket' Malware

    WorldLeaks Ransomware Unleashes New 'RustyRocket' Malware

    A new malware called **'RustyRocket'**, used by the extortion group World Leaks, is designed for stealthy data theft and persistent network access, evading traditional security. The malware, written in Rust, acts as a data exfiltration and proxy tool, targeting Windows and Linux by hiding its tra...

    Read More »
  • Beware Fake PayPal Alerts: Hackers Steal Logins, Deploy Malware

    Beware Fake PayPal Alerts: Hackers Steal Logins, Deploy Malware

    A sophisticated cyberattack uses fake PayPal security alerts, starting with phishing emails and escalating through phone-based social engineering to install malware. Attackers abuse legitimate remote monitoring tools like LogMeIn Rescue and AnyDesk to gain persistent access, evading detection by ...

    Read More »
  • US Border Patrol Surveils Millions of American Drivers

    US Border Patrol Surveils Millions of American Drivers

    The US Border Patrol operates a predictive-intelligence program using hidden license-plate readers to monitor American drivers far from borders, flagging "suspicious" travel patterns and leading to stops and searches, raising Fourth Amendment concerns. Microsoft mitigated the largest recorded DDo...

    Read More »
  • Innoventures Education Boosts Learning with HPE Aruba AI Platform

    Innoventures Education Boosts Learning with HPE Aruba AI Platform

    Innoventures Education has enhanced its digital learning infrastructure by implementing HPE Aruba Networking Central, an AI-driven platform that supports over 9,000 students and 1,500 staff across multiple campuses, ensuring secure and reliable connectivity. The platform provides real-time visibi...

    Read More »
  • Netgear Launches New Orbi 370 Series WiFi 7 Routers

    Netgear Launches New Orbi 370 Series WiFi 7 Routers

    Netgear has launched the Orbi 370 Series, a WiFi 7 mesh system that offers high performance at a more accessible price point, starting from AUD $479, making advanced WiFi 7 technology available to households with moderate needs. The system provides ultra-fast speeds up to 5Gbps, comprehensive who...

    Read More »
  • PwC: AI Leads Cybersecurity Spending as Top Priority

    PwC: AI Leads Cybersecurity Spending as Top Priority

    Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...

    Read More »
  • Critical RCE Flaw in Western Digital My Cloud NAS (CVE-2025-30247)

    Critical RCE Flaw in Western Digital My Cloud NAS (CVE-2025-30247)

    Western Digital has released a critical firmware update (version 5.31.108) to fix a severe remote code execution vulnerability (CVE-2025-30247) in multiple My Cloud NAS models, urging immediate installation to prevent unauthorized access and system takeover. The vulnerability is an OS command inj...

    Read More »
  • Stellar Cyber Enhances SOC with Agentic AI Automation

    Stellar Cyber Enhances SOC with Agentic AI Automation

    Stellar Cyber's 6.3 update embeds "agentic AI automation" to automate the full threat lifecycle, aiming to reduce analyst workload and improve response times across security environments. The release integrates the "Model Context Protocol (MCP)" for third-party tools and features like **AI-ge...

    Read More »
  • Microsoft Issues Critical Windows Update Amid Active Attacks

    Microsoft Issues Critical Windows Update Amid Active Attacks

    Microsoft has issued an urgent security update for Windows Server to patch a critical vulnerability (CVE-2025-59287) that is actively being exploited, allowing remote code execution with system privileges. Only servers with the WSUS Server Role enabled are vulnerable, and CISA has mandated federa...

    Read More »
  • Cloudflare Balances Data Security with AI Access

    Cloudflare Balances Data Security with AI Access

    Cloudflare One has been enhanced to help businesses securely integrate and manage generative AI tools while maintaining data protection and compliance standards. New features include AI Security Posture Management (AI-SPM), offering discovery of AI usage patterns, protection against unapproved AI...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: March 2026

    Top Cybersecurity Jobs Hiring Now: March 2026

    The global cybersecurity job market shows strong demand for diverse roles, with key areas including cloud security, GRC (governance, risk, and compliance), and specialized fields like AI security and threat intelligence. Specific job examples highlight roles focused on protecting critical assets,...

    Read More »
  • China's Salt Typhoon Hackers Target European Telecoms

    China's Salt Typhoon Hackers Target European Telecoms

    A China-linked cyber espionage group known as Salt Typhoon is targeting European telecommunications providers to infiltrate critical infrastructure for intelligence gathering and surveillance. The attackers exploited a Citrix NetScaler Gateway vulnerability, deployed the SNAPPYBEE backdoor via DL...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: February 2026

    Top Cybersecurity Jobs Hiring Now: February 2026

    The global cybersecurity job market is robust, with high demand for specialized roles in areas like cloud security, penetration testing, and vulnerability management to combat evolving digital threats. Specific in-demand positions include Cloud Security Engineers and Researchers, Cyber Defense An...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: January 2026

    Top Cybersecurity Jobs Hiring Now: January 2026

    The global cybersecurity job market is experiencing high demand for specialized roles, with key positions including Chief Information Security Officers (CISOs), Cyber Defence Specialists, and various types of Security Engineers and Analysts across countries like Australia, France, and the UAE. Sp...

    Read More »
  • CPU Spike Exposed RansomHub Ransomware Attack

    CPU Spike Exposed RansomHub Ransomware Attack

    An employee inadvertently triggered a ransomware attack by downloading a malicious file disguised as a browser update, initiating automated reconnaissance and credential harvesting. Attackers established persistence and network access through a SOCKS proxy, exploiting Active Directory weaknesses ...

    Read More »
  • Humanoid Robot Hacked via Bluetooth, Data Sent to China

    Humanoid Robot Hacked via Bluetooth, Data Sent to China

    The Unitree G1 humanoid robot has critical Bluetooth vulnerabilities that allow unauthorized root access and remote code execution due to shared hardcoded encryption keys and improper data validation during setup. Weak encryption in the robot's configuration files and unsecured communication prot...

    Read More »
  • HCLTech Joins GSMA to Drive Telecom Innovation

    HCLTech Joins GSMA to Drive Telecom Innovation

    HCLTech has become the first global technology company to join the GSMA Open Gateway initiative, aiming to accelerate programmable networks and create new monetization opportunities for Communication Service Providers worldwide. The partnership will leverage HCLTech's advanced solutions, includin...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs in September 2025

    Hiring Now: Top Cybersecurity Jobs in September 2025

    A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...

    Read More »