Tag: Firewalls
Beyond patches and firewalls: Advanced strategies for cyberthreat defense
Threat mitigation is to managed service providers (MSPs) what preventative medicine is to doctors. In other words, threat mitigation is the first line – and often least expensive – defense against cybercriminals. Of course, some of the basic steps include...
Cybersecurity Threat Advisory: Active exploits of Cisco firewalls
Two vulnerabilities, CVE-2024-20353 (denial of service) and CVE-2024-20359 (persistent local code execution), were leveraged to create backdoors by a state-sponsored cyber-espionage group, ArcaneDoor, in Cisco firewalls. Review the recommendations in this Cybersecurity Threat Advisory to protect your firewall appliances now. What is...
Cybersecurity Threat Advisory: End-of-Life firewalls actively exploited
Sophos recently addressed a critical vulnerability CVE-2022-3236 involving end-of-life (EOL) firewalls that had been actively exploited. The vulnerability prompted Sophos to release patches for unsupported firewalls after reports of successful attacks on these systems surfaced. Read this Cybersecurity Threat Advisory...
Tech Time Warp: Morris worm alerts the internet to cybersecurity risks
Back in 1988, the internet was a much smaller and friendlier place. No more than 100,000 computers were online, and no one considered the need for precautions like firewalls. In this week’s Tech Time Warp, we will see where that...
Guarding the Gates: The rise of network protection in the 1990s
As part of our 5-part series on the evolution of cybersecurity, check out our second article below that covers how the security industry laid the groundwork for a more holistic approach to cybersecurity. We are continuing our series that explores...
Barracuda named a Visionary in the 2022 Gartner® Magic Quadrant™ for Network Firewalls
Gartner has named Barracuda as a Visionary in the 2022 Gartner Magic Quadrant for Network Firewalls. This is the second year Barracuda has been recognized as a Visionary in this report based on Ability to Execute and Completeness of Vision. According...