Cybersecurity knowledge explained


Most dangerous vulnerabilities, always up to date

Latest Cyber Threats and Vulnerabilities

The new Latest Cyber Threats section on lists the most dangerous and impacting threats currently known. We use multiple CVE sources to create the list, which we then consolidate and categorize. Our algorithm searches for threats with high risk and impact so that only the really relevant vulnerabilities are shown.

Drop rules can impact network performance

Drop vs Reject

Many administrators configure their firewalls to block any network communication using DROP rules for unused ports. This is also recommended on many websites. However, this is not the best approach and often leads to unnecessary losses in network performance and higher CPU load. Here’s why.