The Voice of Cyber®

Network Security

Network Security involves the implementation of measures to safeguard the integrity, confidentiality, and availability of data transmitted over networks. This encompasses a range of technologies and practices, including firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and secure network architecture.

Newest Release

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address instead. Zephyr OS network stack implementation does not drop IP packets arriving from an external interface with a source address equal to the localhost or the destination address, which is a violation of the recommended security practice. When the localhost or the destination address is used as a fake source address, then the response ends up to the loopback ...

Deep Dive Articles

Sort By

  • Date
  • Title

In The News

Sort By

  • Date
  • Title