by bct2mastertemp | Aug 22, 2022 | Blog
Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of all shapes and sizes to unify their communications, and it is especially...
by bct2mastertemp | Jul 22, 2022 | Blog
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN Router If so, be advised that a new and critical security vulnerability has...
by bct2mastertemp | Jul 20, 2022 | Blog
Corporate branding can be worth its weight in gold and certain images are absolutely iconic. The Golden Arches, the Nike “swoosh,” and Apple’s Apple all come to mind. Logo images give companies the means of offering a consistent brand image over...
by bct2mastertemp | Jul 18, 2022 | Blog
Microsoft Exchange servers are once more in the crosshairs of hackers around the world. Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware attacks, the hackers here first rifle through an...
by bct2mastertemp | Jul 14, 2022 | Blog
If you’re involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds on March of this year (2022) and its main focus seems to be targeting Linux servers in...