#StopRansomware: Interlock

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures…

An explanation of firewall types and uses

<p><i>In this video, Informa TechTarget managing editor Kate Murray explains the different kinds of firewalls and how they are used to combat cyberthreats.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div> <p>Firewalls…

Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Multiple security vulnerabilities affecting Sophos firewall products, with two enabling pre-authentication remote code execution that could allow attackers to compromise systems without valid credentials.  The vulnerabilities, tracked as CVE-2025-6704, CVE-2025-7624, CVE-2025-7382, CVE-2024-13974, and CVE-2024-13973, impact various configurations of Sophos Firewall…

BitRaser secures data erasure on macOS devices

BitRaser launched its Integrated Mac Eraser and Diagnostics Tool, a software designed to streamline IT asset disposition (ITAD) processes. The tool allows ITAD providers to simultaneously perform secure data erasure and comprehensive hardware diagnostics on macOS devices, including both Apple…