IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.
https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/
IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.
https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/
A list of 3rd party file mirrors you may not want users accessing.
https://github.com/BadSamuraiDev/bs-lists/blob/main/file-mirrors.txt
Cisco: Fresh firewalls from 1.5 to 400 Gbit/s throughput
Cisco completes its security portfolio with new firewalls, CVE protection on data center switches and uniform guidelines.
Cisco: Frische Firewalls von 1,5 bis 400 Gbit/s Durchsatz
Cisco komplettiert sein Sicherheitsportfolio mit neuen Firewalls, CVE-Schutz auf Rechenzentrumsswitchen und einheitlichen Richtlinien.
iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen
Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.
Rethinking Regex: Smarter detection for a modern threat landscape
Using regular expressions, or regex, was once a convenient and powerful way for web application firewalls (WAFs) to find malicious code in web requests.
https://www.scworld.com/resource/rethinking-regex-smarter-detection-for-a-modern-threat-landscape
How to add my Ultimate #AI Block List to BBQ Pro #Firewall with just a few clicks https://plugin-planet.com/bbq-pro-add-ultimate-ai-block-list/ #WordPress #security
Surge in Attacks Leveraging CNVD Exploits: A Warning Sign for Global Defenders
On the 15th of May, the CrowdSec Network recorded a sharp uptick in exploitation attempts targeting three exploits that are tracked exclusively in the Chinese National Vulnerability Database (CNVD): CNVD-2019-19299
CNVD-2022-42853
CNVD-2021-30167
Key findings:
While the #CrowdSec Network’s visibility beyond the Great #Firewall is constrained, we can still observe the campaign and what else these attackers are looking for.
The spike, visible in the chart, reveals coordinated scanning behavior that likely signals a broader exploitation campaign currently in motion.
Here’s the Twist: The same attacker clusters are also seen deploying vulnerabilities commonly cataloged in the NVD, targeting global software.
This mix of CNVD and CVE-based tactics suggests one thing: Attackers aren’t limiting themselves by geography, so why should defenders?
As software supply chains become increasingly globalized, relying exclusively on U.S.-centric vulnerability databases such as the NVD creates dangerous blind spots. Threat actors clearly understand this, and they are actively exploiting those gaps.
Trend analysis:
May 15th: CrowdSec detects a surge in scans exploiting CNVD-2019-19299, CNVD-2022-42853, and CNVD-2021-30167. Most targeted software is used in mainland China, but activity comes from global IP ranges.
Ongoing: Attacker infrastructure also launches probes for high-profile CVEs in Apache, Atlassian, and Jenkins, showing no regional constraint in their tooling.
Common TTPs: Remote code execution (RCE), abuse of default credentials, and mass scanning via compromised VPS infrastructure.
How to protect your systems:
Thanks to CrowdSec’s global network of decentralized agents, this trend was caught early. CrowdSec users are already benefiting from real-time protection via up-to-date blocklists and mitigation rules. Want to stay protected against CNVD and CVE threats alike?
Investigate: Check your software supply chain and note any pieces that might have their exploits tracked outside the NVD system, for example, you can take a closer look at the EUVD recently launched by @enisa_eu
Preemptive blocking: Deploy the CrowdSec WAF for automated mitigation with 100+ virtual patches and geo-aware rules: https://youtube.com/watch?v=LyNfr4QWiqw
iptables-Regeln erstellen und dauerhaft speichern (Iptables Teil 2)
In diesem Artikel erkläre ich, wie man eigene Firewall-Regeln mit iptables erstellt und dauerhaft speichert. Mit dabei: eine Einführung in die wichtigsten Begriffe wie INPUT, OUTPUT, DROP und conntrack.
#iptables #iptables_persistent #Firewall #Netzwerksicherheit #Linux #Linux
https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2
Had a beer. Got an idea.
Why not use a live USB with BashCore in a dust-collector old pc as a smart home firewall?
Block IoT devices from phoning home
Route traffic through a hardened CLI
SSH in, control everything
No install. No bloat. Just power.
Network Management with the OpenBSD Packet Filter Toolset https://www.bsdcan.org/2025/timetable/timetable-Network-Management-with.html at #bsdcan now concluded, new slides up at https://nxdomain.no/~peter/pf_fullday.pdf -- now with during-session updates (labs available for attendees only, sorry)
Linux systems unable to reach out to internet behind pfsense while Windows work fine.
I am trying to set up my #homelab for #forensics and I have encountered a very weird issue. I am running an internal pfsense #firewall for my environment. On this firewall there are 3 interfaces: WAN and two Isolated Labs.
On the "WAN" interface, both #linux and windows systems are able to access the internet without any problems.
But on the other two lans - named Infrastructure and Lab - the Linux systems are not able to connect to the internet after booting, while the systems are able to communicate with each other. In order to get them working I need to go the respective interface and make any change there and save the page, practically refreshing the settings on the interface. After this all currently online linux systems on that interface are working as expected and connectivity is restored. As you can imagine this is a huge pain, especially when I am testing things and I need to turn on various systems at different times. If i put the systems on the WAN interface they face no issue at all, so what could be the solution here for fixing connectivity for linux systems on the other interfaces?
edit: it issue is both on pfsense 2.7.2 and 2.8.0
1/3 ¡Nueva promoción de precios mínimos por tiempo limitado!
¿Querés aprender Linux, Redes, Python/Flask, shell scripting, Wireshark, SSH, iptables y más?
Todos nuestros cursos a sólo USD 9.99 por 5 días!
Acá los descuentos. Te esperamos!!
(Por otras formas de pago: info@juncotic.com)
#Linux #Redes #TCPIP #Python #Flask #shellscripting #Wireshark #SSH #iptables #firewall
Was ist #iptables-persistent?
Und wie unterscheidet es sich von #UFW? (Iptables Teil 1)
Wer mit der #Linux-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW?
Die integrierte #Firewall #iptables ist auf den meisten GNU/#Linux-Systemen verfügbar und bietet eine leistungsfähige Möglichkeit, Netzwerkzugriffe zu kontrollieren.
https://gnulinux.ch/was-ist-iptables-persistent-und-wie-unterscheidet-es-sich-von-ufw
Was ist iptables-persistent? Und wie unterscheidet es sich von UFW? (Iptables Teil 1)
Wer mit der Linux-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW?
#iptables #Firewall #Ufw #Netzwerksicherheit #iptables_persiste #Linux
https://gnulinux.ch/was-ist-iptables-persistent-und-wie-unterscheidet-es-sich-von-ufw