Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

Posted on October 28, 2025October 28, 2025 By CWS

IPFire 2.29 Core Replace 198 marks a major development for customers of this open-source firewall, introducing enhanced Intrusion Prevention System (IPS) capabilities powered by Suricata 8.0.1.

This launch emphasizes improved community monitoring by modern reporting instruments, alongside toolchain rebasing and intensive bundle updates to bolster safety and efficiency.

Designed for each small places of work and huge enterprises, the replace addresses long-standing consumer requests for higher visibility into safety occasions, making certain directors can reply swiftly to threats.

The standout addition in IPFire 2.29 is the brand new IPS reporting suite, which transforms how community exercise is tracked and documented.

Directors can now obtain fast e mail notifications for alerts exceeding a user-defined threshold, making certain essential incidents are flagged in real-time with out sifting by logs.

Enhanced IPS Reporting Options

Scheduled PDF experiences, generated day by day, weekly, or month-to-month, supply complete summaries of all alerts in a readable format appropriate for archiving or sharing with stakeholders.

Moreover, alerts will be forwarded to distant syslog servers, offering an impartial log path that survives potential firewall compromise for strong forensic evaluation.

These options improve auditability, permitting groups to take care of verifiable information of risk detection and response, even in adversarial eventualities.

A pattern PDF report demonstrates the readability of those outputs, together with occasion timelines and severity highlights. By extending IPS knowledge past the gadget itself, IPFire strengthens operational accountability and simplifies compliance efforts.

Upgrading to Suricata 8.0.1, the IPS now caches compiled guidelines for quicker startups and contains extra resilient reminiscence administration.

Expanded protocol help covers DNS-over-HTTP/2, Multicast DNS, LDAP, POP3, SDP in SIP, SIP over TCP, and WebSocket, enabling deeper site visitors inspection.

On ARM architectures, the Vectorscan library optimizes sample matching utilizing superior vector directions, delivering sharper efficiency in resource-constrained environments.

These enhancements make sure the IPS stays environment friendly towards evolving threats whereas minimizing overhead on {hardware}.

The IPFire toolchain has been rebased on GNU Compiler Assortment 15.2.0, GNU Binutils 2.42, and GNU glibc 2.42, incorporating bug fixes, safety patches, and efficiency good points.

A broad array of packages obtained updates, together with BIND 9.20.13 for DNS stability, cURL 8.16.0 for safe transfers, and sudo 1.9.17p2 for privilege administration enhancements.

Intel’s newest microcode addresses current processor vulnerabilities, whereas GRUB has been fortified towards a number of exploits.

Notably, accountable disclosure from VulnCheck and Pellera Applied sciences revealed 18 net UI vulnerabilities as a consequence of inadequate enter validation from browsers.

These have been patched and assigned CVEs from 2025-34301 to 2025-34318, all rated with potential for cross-site scripting or injection if exploited by authenticated admins.

CVE IDDescriptionBugzilla IDCVSS Rating (Estimated)CVE-2025-34301Web UI enter validation flaw#13876Medium (6.1)CVE-2025-34302Web UI enter validation flaw#13877Medium (6.1)CVE-2025-34303Web UI enter validation flaw#13878Medium (6.1)CVE-2025-34304Web UI enter validation flaw#13879Medium (6.1)CVE-2025-34305Web UI enter validation flaw#13880Medium (6.1)CVE-2025-34306Web UI enter validation flaw#13881Medium (6.1)CVE-2025-34307Web UI enter validation flaw#13882Medium (6.1)CVE-2025-34308Web UI enter validation flaw#13883Medium (6.1)CVE-2025-34309Web UI enter validation flaw#13884Medium (6.1)CVE-2025-34310Web UI enter validation flaw#13885Medium (6.1)CVE-2025-34311Web UI enter validation flaw#13886Medium (6.1)CVE-2025-34312Web UI enter validation flaw#13887Medium (6.1)CVE-2025-34313Web UI enter validation flaw#13888Medium (6.1)CVE-2025-34314Web UI enter validation flaw#13889Medium (6.1)CVE-2025-34315Web UI enter validation flaw#13890Medium (6.1)CVE-2025-34316Web UI enter validation flaw#13891Medium (6.1)CVE-2025-34317Web UI enter validation flaw#13892Medium (6.1)CVE-2025-34318Web UI enter validation flaw#13893Medium (6.1)

Add-on packages like HAProxy 3.2.4, nginx 1.29.1, and Samba 4.22.4 additionally noticed updates, extending IPFire’s versatility for superior deployments. This launch solidifies IPFire’s position as a dependable, evolving safety cornerstone.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Firewall, Intrusion, IPFire, OpenSource, Prevention, Reporting, System

Post navigation

Previous Post: Sublime Security Raises $150 Million for Email Security Platform
Next Post: Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access

Related Posts

New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
OpenAI Banned ChatGPT Accounts Used by Chinese Hackers to Develop Malware Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News