Category Security

ADPulse: BEYOND THE PERIMETER AD SECURITY AUDIT

Beyond the Perimeter: Auditing Active Directory Security with ADPulse’s 35-Point Automated Scan BEYOND THE PERIMETER ACTIVE DIRECTORY SECURITY AUDIT How ADPulse’s 35-point automated scan turns hours of manual AD auditing into minutes — and what those checks actually find inside…

Pangolin 1.16 Tunneled Reverse Proxy Adds SSH Auth Daemon

Pangolin 1.16 Tunneled Reverse Proxy Adds SSH Auth Daemon

The open-source remote access platform Pangolin has introduced version 1.16, bringing several enhancements focused on identity-driven access and platform usability. One of the headline additions is a new SSH authentication daemon that ties SSH access directly to the platform’s identity…

Wireshark 4.6.4 Packet Analyzer Fixes USB HID Memory Exhaustion

Wireshark 4.6.4 Packet Analyzer Fixes USB HID Memory Exhaustion

Wireshark, the widely used open-source tool for packet capture and network analysis, has released version 4.6.4, bringing a mix of security patches, stability fixes, and performance improvements. This update resolves three vulnerabilities (CVE-2026-3201, CVE-2026-3202, and CVE-2026-3203). The fixes address a…

Setting Up a DNS Sinkhole with Windows Server 2025

Setting Up a DNS Sinkhole with Windows Server 2025

A DNS Sinkhole (also called a DNS blackhole or DNS blacklist) is a cybersecurity mechanism that intercepts DNS queries for known malicious, unwanted, or restricted domain names and redirects them to a controlled IP address — instead of resolving them…

Let’s Encrypt Introduces DNS-PERSIST-01 for Persistent ACME DNS Validation

Let’s Encrypt Introduces DNS-PERSIST-01 for Persistent ACME DNS Validation

Let’s Encrypt has introduced support for a new ACME challenge type called DNS-PERSIST-01, designed to simplify certificate issuance and renewal through a persistent DNS-based authorization model. This new mechanism, based on an IETF draft, serves as an alternative to the…

Acunetix Web Vulnerability Scanner Premium v24.10.241106172

Web applications are one of the most targeted attack surfaces in modern infrastructure. Whether you’re running internal business portals, SaaS applications, or public-facing APIs, continuous vulnerability scanning is no longer optional. Acunetix Web Vulnerability Scanner is a commercial web application…

Download PA-VM-ESX-11.1.6-h7 Palo Alto VM Firewall

Download PA-VM-ESX-11.1.6-h7 Palo Alto VM Firewall

Organizations moving toward virtual infrastructure still need strong perimeter and internal network protection. The PA-VM-ESX-11.0.0 OVA provides a ready-to-deploy virtual firewall appliance from Palo Alto Networks designed for use in VMware environments. This appliance allows administrators, security engineers, and lab…

Malware detection methods in Veeam Backup & Replication 13

Malware detection methods in Veeam Backup & Replication 13

Veeam Backup & Replication version 13 (for Linux Appliance and Windows) includes significant improvements in malware detection compared to version 12.3, and several new features have been added. The different malware detection methods in this version, although different in function and…

VMware ESXi Vulnerability Actively Exploited in 2026 — Patch Guidance for Admins

VMware ESXi Vulnerability Actively Exploited in 2026 — Patch Guidance for Admins

A serious security concern is dominating virtualization news this month as a critical flaw affecting VMware ESXi servers has begun seeing active exploitation in the wild. System administrators and IT security teams need to act immediately to protect their infrastructure.…

NetworkManager 1.56 Released with WireGuard Peer Management in nmcli

NetworkManager 1.56 Released with WireGuard Peer Management in nmcli

Overview The widely used Linux networking service NetworkManager has introduced version 1.56, bringing a mix of functional improvements, policy refinements, and infrastructure updates aimed at both desktop and enterprise deployments. Released six months after NetworkManager 1.54, this latest version demonstrates…