Ransomware: Are You Paying Attention?

  • in Blog Posts
  • by
  • October 7, 2017
  • Comments Off on Ransomware: Are You Paying Attention?

If the news about ransomware in recent weeks hasn’t gotten your attention, then maybe the fact that its threat magnitude has grown 35X over the past year will jolt you into a state of awareness. Further, ransomware isn’t a threat confined to just a few industries or geographical regions; it Continue Reading

New SIP Trunk for European Customers – Introducing MIXvoip

  • in Blog Posts
  • by
  • October 6, 2017
  • Comments Off on New SIP Trunk for European Customers – Introducing MIXvoip

We’ve added yet another new SIP trunk to our ever-growing list of supported providers. This time we would like to introduce you to Luxembourg-based telco provider MIXvoip. We have now completed interop testing between MIXvoip’s SIP trunk and 3CX 15.5 and, following the successful outcome, MIXvoip can now be selected Continue Reading

Joomla! 3.8.1 Release

  • in Blog Posts
  • by
  • October 6, 2017
  • Comments Off on Joomla! 3.8.1 Release

Joomla! 3.8.1 is now available. This is a bug fix release for the 3.x series of Joomla fixing bugs which were reported after the 3.8.0 release. What’s in Joomla! 3.8.1? Joomla! 3.8.1 addresses several bugs reported after the 3.8.0 release, including: Fix handling of image srcset attribute #17978 Some plugin Continue Reading

Executive Insights: Threat Intelligence: The Fuel that Powers Cyber Defenses

  • in Blog Posts
  • by
  • October 6, 2017
  • Comments Off on Executive Insights: Threat Intelligence: The Fuel that Powers Cyber Defenses

For anyone reading the news regularly, it’s not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider’s perspective, I can add that tackling them is a fast mounting challenge for the millions of businesses that come under attack daily.  Continue Reading

How to add Centralized Slave DNS to Plesk Multi Server

  • in Blog Posts
  • by
  • October 5, 2017
  • Comments Off on How to add Centralized Slave DNS to Plesk Multi Server

Hey there fellow Pleskians! Today we’ve been thinking about enhancing Plesk Multi Server with Centralized DNS support. Why? Because you’ll be able to use a single set of name servers for all the domains you host on Plesk Multi Server service nodes. And even if we’re still developing Centralized DNS further, you can Continue Reading

MySQL Cluster Manager 1.4.4 released!

  • in Blog Posts
  • by
  • October 5, 2017
  • Comments Off on MySQL Cluster Manager 1.4.4 released!

MySQL Cluster Manager 1.4.4 is now available for download from My Oracle Support. What’s new?With MCM 1.4.4 we continue to improve on MySQL Cluster Manager, specifically around: the collect logs command process status reporting process command execution in specific scenarios More detailsMore details are available in the MCM 1.4.4 Release Continue Reading

EasyApache 3 October 2017 Maintenance Release

  • in Blog Posts
  • by
  • October 5, 2017
  • Comments Off on EasyApache 3 October 2017 Maintenance Release

SUMMARYcPanel, Inc. has released updated RPMs for EasyApache 4 on October 3, 2017, with Ruby 2.4.2. This release addresses vulnerabilities related to CVE-2017-0898, CVE-2017-10784, CVE-2017-14033, and CVE-2017-14064. We strongly encourage all Ruby users to upgrade to version 2.4.2. AFFECTED VERSIONSAll versions of RubyGems through 2.4.1 SECURITY RATINGThe National Vulnerability Database Continue Reading

Block Incoming Connections by Country with MDaemon’s New Location Screening Feature

  • in Blog Posts
  • by
  • October 5, 2017
  • Comments Off on Block Incoming Connections by Country with MDaemon’s New Location Screening Feature

Block connections by country with Location Screening As I announced recently in this post, MDaemon 17.5 has been released, with new security and collaboration features. One feature that our users will find particularly useful is the new Location Screening feature, which allows administrators to block incoming connections from specific countries. Continue Reading

Potential Ichitaro Phishing Vulnerability

  • in Blog Posts
  • by
  • October 4, 2017
  • Comments Off on Potential Ichitaro Phishing Vulnerability

The FortiGuard Labs team continually tracks phishing and spam campaigns around the world. Sending users macro-enabled documents with a malicious payload is one of the most commonly used malware attack vectors for phishing campaigns. This attack vector has been used by used by such prevalent malware families as Dridex, Fareit, Continue Reading

Page 4 of 147« First...23456...102030...Last »