WordPress (Core) Stored XSS Vulnerability

FortiGuard Labs Breaking Threat Research Overview WordPress is the world’s most popular Content Management System (CMS). It has 60.4% of the global CMS market share, which is far higher than the second-place Joomla!, which only has 5.2% of the market share. As a result, over a third of all of Continue Reading

The Bi-Directional Cloud Highway: Critical Insights into Today’s Cloud Infrastructures

The development of the cloud over the last 15 years is one of the most significant convergences of computing and communications technologies in history. It provides unprecedented agility and scalability for organizations, immediate access to information and transactions for individuals and has transformed our global economy similar to smartphones and Continue Reading

The Hidden Challenge of the Cloud Security Skills Gap

The need for talented IT professionals remains a top concern for most organizations. According to one recent report, organizations say they currently face skills shortages across a range of IT specialties, including server/systems administration (43%), general network administration (36%), and database administration (31%). The lack of seasoned cybersecurity professionals is Continue Reading

Defining the SD-Branch

One of the most important aspects of digital transformation is that it is a continual process. And most people don’t realize that it has been underway for several years, probably beginning when organizations decided to let users have access to the internet. Since then there have been several huge transformational Continue Reading

Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

To ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server. Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated Continue Reading

Four Essential Cloud Security Concepts

Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information—wherever they are located and on whatever device they are using. That requires nimble resources Continue Reading

Never Lose an Important Email: How to Track Messages in Security Gateway

Most of our customers are small-to-medium businesses with limited IT budgets across a variety of industries – including healthcare, education, manufacturing, and government. Having a limited IT budget often means having limited staff available for troubleshooting email or tracking down messages, so when considering which email gateway/spam filter you want Continue Reading

Transitioning to ISRG’s Root – Let’s Encrypt

On July 8, 2019, we will change the default intermediate certificate we provide via ACME. Most subscribers don’t need to do anything. Subscribers who support very old TLS/SSL clients may want to manually configure the older intermediate to increase backwards compatibility. Since Let’s Encrypt launched, our certificates have been trusted Continue Reading

Reactive vs. Proactive Cybersecurity: 5 Reasons Why Traditional Security No Longer Works

Security sprawl is a real challenge for most organizations, especially now as networks are expanding and evolving rapidly, and security resources are increasingly limited. If you’re like most companies, you’ve loaded your wiring closet with a hodge-podge of perimeter defenses over the years. Most of these tools operate in isolation, Continue Reading

Oracle VirtualBox NAT Network DoS Vulnerability

Zero-Day Threat Analysis by FortiGuard Labs Oracle VirtualBox is the world’s most popular cross-platform virtualization product. The FortiGuard Labs team recently discovered on (December 6, 2018) a network Denial of Service (DoS) vulnerability in Oracle VirtualBox (CVE-2019-2527). This DoS vulnerability is caused by a crafted TCP session sent from a Continue Reading

>