Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • PARTNERSHIP WITH LOGON
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • PARTNERSHIP WITH LOGON
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH
View large
Acunetix-news, news

Acunetix | Are you safe from your web vulnerabilities?

Posted on at by

Acunetix: Are you safe from your web vulnerabilities?

Even the Mightiest Fall: An SQL Injection in Sophos XG Firewall

Do you really think you are safe from web vulnerabilities or that they are just minor problems?

A few days ago Sophos, one of the world’s most renowned security companies, found an SQL Injection in their product. What is worse, they found the vulnerability because malicious hackers have been using it to attack their clients.

What Happened to Sophos?

Sophos discovered that malicious hackers mounted attacks on their hardware product called Sophos XG Firewall. The vulnerability that allowed them to do so turned out to be an SQL Injection. This vulnerability, in turn, lead to another very serious issue: remote code execution.

Attackers were able to use this SQL Injection to download the Asnarok trojan (read the whole technical description here). This trojan was then able to steal the login credentials of firewall users.

The vulnerability has been hotfixed and all users of the Sophos XG Firewall have been asked to download the firmware update.

What Does This Mean to You?

  • If a security giant such as Sophos can fall victim to an SQL Injection and RCE, so can you. Not to mention other vulnerabilities.
  • SQL Injections have been known for more than 20 years and most programming languages have countermeasures. And still, they happen.
  • An SQL Injection can lead to someone taking over your system and installing a trojan on it. But it can have even more fatal consequences.

What Can You Do?

The only way to protect yourself against such attacks is to regularly check for vulnerabilities. Of course, you can do it manually, performing penetration testing, but it’s much more efficient to automate the process with a vulnerability scanner.

And Acunetix does it best. So give us a try.

TRY ACUNETIX FREE TRIAL
was last modified: May 27th, 2021 by
Share Post
Previous
Introducing Acunetix Version 13 !
Next
JetBrains | Newly Released IntelliJ IDEA 2020.1

About Author

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: [email protected]

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Request for Training Quote
  • Please enter a number from 1 to 20.
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request a Demo !

      Search

      Results for {phrase} ({results_count} of {results_count_total})

      Displaying {results_count} results of {results_count_total}

      Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

      Generic filters
      Exact matches only
      Search in title
      Search in content
      Search in excerpt
      UserLock Video