Support:Linux Application Platform 100264 (sr57) available

Source:: Innovaphone

Threat Roundup for June 28 to July 5

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 28 and July 5. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Finding ROI Gold in Real-time Customer Feedback

By McCall Moore Partner Success Story Too often, businesses find out about unhappy customers after they’ve left. Maybe the hotel room was too hot, or they were less than impressed with the free breakfast. The chance to make good is gone, and now there’s a negative online review and a lost opportunity for customer loyalty. […]

Vulnerability Spotlight: Remote code execution vulnerabilities in Simple DirectMedia Layer

By Talos Group Simple DirectMedia Layer contains two vulnerabilities that could an attacker to remotely execute code on the victim’s machine. Both bugs are present in the SDL2_image library, which is used for loading images in different formats. There are vulnerabilities in the function responsible for loading PCX files. A specially crafted PCX file can […]

FortiGate 100F – F wie flott

Eine neue Generation der weit verbreiteten 100er Serie der FortiGate geht an den Start. Die FortiGate 100F (wobei das F durchaus für flott stehen könnte) punktet z.B. mit dem nagelneuen SoC4, der von Fortinet als SD-WAN ASIC konzipiert wurde. Diese Vorteile bietet die FortiGate 100F: SD-WAN optimierte Hardware dank SoC4 20 Gbps Firewall Durchsatz 700 […]

RATs and stealers rush through “Heaven’s Gate” with new loader

By Talos Group Malware is constantly finding new ways to avoid detection. This doesn’t mean that some will never be detected, but it does allow adversaries to increase the period of time between initial release and detection. Flying under the radar for just a few days is enough to infect sufficient machines to earn a […]

Get a Security System, not a Security Smorgasbord

By John Dominguez If you’re still juggling a lot of cyber security tools, you’re not alone. Even as businesses make headway on trimming point-solutions, the recently released Cisco CISO Benchmark Report found that 14% of security leaders are managing more than 20 vendors. And 3% are dealing with over 50. It’s easy for this to […]