Learn how Volt Typhoon exploits VPN zero-day flaws in Fortinet, Ivanti & others, and how Versa protects enterprises with Zero Trust & NGFW.| The Versa Networks Blog - The Versa Networks Blog
Learn how Versa protects against CVE-2024-3400, a zero-day in Palo Alto PAN-OS GlobalProtect under active exploitation. Get mitigation and update guidance.| The Versa Networks Blog - The Versa Networks Blog
On October 20, 2023, Okta disclosed a security incident affecting their customer support management system. In a note following that disclosure Okta said that from September 28, 2023, to October 17, 2023, a threat actor gained unauthorized access to files inside Okta’s customer support system associated with 134 Okta customers, or less than 1% of Okta customers.| The Versa Networks Blog - The Versa Networks Blog
Learn about critical Ivanti Connect Secure CVEs, their exploitation, and how Versa Networks provides protection through ZTNA, VSIA, and NGFW solutions.| The Versa Networks Blog - The Versa Networks Blog
New critical CVEs in ConnectWise ScreenConnect exploited in the wild. Patch CVE-2024-1709 & CVE-2024-1708 now. See mitigation, risks & protections.| The Versa Networks Blog - The Versa Networks Blog
Summary On October 16, 2023, Cisco reported two new vulnerabilities in the web UI for its Cisco IOS XE operating system that runs many of its routers and switches, CVE-2023-20198 and CVE-2023-20273. These vulnerabilities were initially being exploited by unknown hackers and affected more than 10,000 devices at the time of its first known existence.| The Versa Networks Blog - The Versa Networks Blog
Products| The Versa Networks Blog - The Versa Networks Blog
Senior Threat Analyst, Versa Networks| versa-networks.com
Posts tagged ‘Security Bulletin’| The Versa Networks Blog - The Versa Networks Blog
Company Updates| The Versa Networks Blog - The Versa Networks Blog
Research Lab| The Versa Networks Blog - The Versa Networks Blog
Posts by Versa Security Research Team| versa-networks.com
A medium-severity vulnerability was discovered in Versa Director (CVE-2024-39717), and a patch has been released. Impacted customers failed to implement system hardening and firewall guidelines, leaving a management port exposed on the internet.| The Versa Networks Blog - The Versa Networks Blog