CentOS 8 and CentOS Stream updates, and feeds.centos.org – Blog.CentOS.org

Over the past few weeks we’ve gotten questions on various forums – email, Twitter, IRC, and so on – about why there are no mentions of CentOS 8 updates, or CentOS Stream updates, on the centos-announce mailing list. For those not familiar, centos-announce is were we tell you about security Continue Reading

CentOS Community newsletter, February 2020 (#2002) – Blog.CentOS.org

Dear CentOS enthusiast, After a slowdown over the past few months, the year is off to a busy start. I’m getting the newsletter out a little later than usual, due to having spent last week in Brussels, at FOSDEM. More about this below. Special thanks go to Aman Gupta, who Continue Reading

VMware ESXi Command Injection Vulnerability

Overview VMware is the market leader in cloud infrastructure software, with over 41% market share. The VMware ESXi solution is a bare metal hypervisor that installs directly onto your physical server and partitions it into multiple virtual machines. The FortiGuard Labs team recently discovered a command injection vulnerability in VMware ESXi. This Continue Reading

The Bi-Directional Cloud Highway: Critical Insights into Today’s Cloud Infrastructures

The development of the cloud over the last 15 years is one of the most significant convergences of computing and communications technologies in history. It provides unprecedented agility and scalability for organizations, immediate access to information and transactions for individuals and has transformed our global economy similar to smartphones and Continue Reading

Undocumented Excel Variable Used in Malicious Spam Run Targeting Japanese Users

Over the course of the past few months, the FortiGuard SE group has been utilizing and enhancing the Fortinet machine learning systems to detect emerging threats. Recently, one of those machines detected an anomalous spike that led us to discover a malware campaign that had been using social engineering techniques Continue Reading

Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported. Effective July 30, 2019, technical support will be discontinued for the following product versions: MDaemon – Versions 14.5.x and below Security Gateway – Versions 4.5.x and below Outlook Connector Continue Reading

Critical Strategies for Staying Ahead of Emerging Cyberthreats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. Organizations have spent the last two decades updating their security gear to keep up with the latest threats and attack vectors. In the late 1990s, the creation of Continue Reading

5G Implications for Security

Mobile network infrastructures have evolved dramatically over just a few short years. The evolution from 3G to 4G, for example, enabled the mobile infrastructure to deliver new data-centric services to consumer, such as rich multimedia, along with enhanced content capabilities and services. 5G will enhance the power and capacity of mobile Continue Reading

Endless Zero-Days?

The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6 percent were actually exploited in the wild. The challenge is that predicting which vulnerability will be targeted next, and which exploit will Continue Reading

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading