Firewall Firm is a Managed Cyber Security Company in India
Home » Blog

Blog

DLL Hijacking attacks: What is it and how to stay protected?

DLL Hijacking attacks are broadly categorized into three types – DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack. For DLL hijacking attack to be successful, it would require an attacker to trick victims to open a file using a vulnerable application from a remote network location. DLL Hijacking is an attack vector that could allow attackers ...

Read More »

Fireware 12.4 Beta Release

Fireware 12.4 Beta We’ve just posted the latest update to our Fireware 12.4 Beta release. This release, which is available for all Firebox appliances, continues WatchGuard’s commitment to building out our SD-WAN roadmap. We’ve seen very positive reaction to the features that we introduced in 12.3, and there has been lots of great feedback on 12.4 in the Beta forum ...

Read More »

Attackers compromised Pakistani government website to deliver Scanbox Framework payload

Researchers detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Trustwave notified the Pakistani government website about the infection, however, the site still remains compromised. What is the issue – Researchers from Trustwave detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Worth noting – The compromised Pakistani ...

Read More »

Man drives 3,300 miles to talk to YouTube about deleted video

On Sunday, police in Mountain View, California, where Google is headquartered, arrested a man who drove more than 3,300 miles from Maine to discuss what he thought was the company’s removal of his YouTube account and the one video he’d posted – one about getting rich quick. It was not, in fact, deleted by YouTube. It turns out, his wife ...

Read More »

7 uncomfortable truths of Endpoint Security: A Sophos report

A report released today by Sophos reveals that IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else. The study, 7 Uncomfortable Truths of Endpoint Security, surveyed over 3,100 IT managers in 12 different countries across industry verticals and organization sizes, and was conducted by the independent research specialist Vanson Bourne. The report reveals ...

Read More »

SECURITY & FRAUDIndia Lender Warns Of WhatsApp Scam That Steals Bank Details

State Bank of India (SBI), the country’s biggest lender, has issued a warning that account holders are being tricked into offering up personal banking details. According to a report in BGR, SBI said messages from WhatsApp and other social media platforms are tricking customers into sharing details of their accounts. The hackers are tricking the users by first sending a message in an effort ...

Read More »

Stolen email credentials being used to pry into cloud accounts

Malicious actors are using the massive supply of previously stolen login credentials to help brute force their way into high-profile cloud-based business systems that cannot easily use two-factor authentication for security. Proofpoint researchers found the availability of these tools has powered a massive increase in the number of cloud attacks taking place which in turn enable the attackers to possibly ...

Read More »

RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat

When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA. SAN FRANCISCO – The influx of connected products in the home – from smart thermometers to connected locks – presents a disturbing new threat surface for victims of domestic abuse. That’s what Lisa Green, senior director of ...

Read More »