New features of Plesk Obsidian

Plesk’s evolution is ongoing process since hosting industry is changing dynamically and proactively. Cloud technologies are revolutionizing the industry and IT professionals need help to manage numerous environments and services in more agile and time-efficient way. Productivity is the core KPI here and Plesk Obsidian is the timely solution for Continue Reading

CentOS News

CentOS 8 Status 17-June-2019 – Blog.CentOS.org

CentOS 8 Status 17-June-2019 Monday , 17, June 2019 bstinson Uncategorized Since the release of Red Hat Enterprise Linux 8 (on 07-May) we’ve been lookinginto the tools that we use to build CentOS Linux. We’ve chosen to use the Kojibuildsystem for RPMs, paired with the Module Build Service for modules, Continue Reading

Locky Launches a More Massive Spam Campaign with New “Lukitus” Variant

It has just been a week since the variation of Locky named Diablo6 appeared. Now it has launched another campaign more massive than the previous. This time, it uses “.lukitus”, which means “locking” in Finnish, as the extension for the encrypted files. The FortiGuard Lion Team was the first to Continue Reading

3CX SBC Notification – Issue Fixed

Please be aware that since yesterday 3CX SBC clients configured to use encryption will not connect to 3CX Servers. New versions have been updated that correct the problem. Download windows, raspberry pi and Debian versions below. We will publish more information shortly. Windows SBC Users: Download 3CX SBC from here Continue Reading

You can now use Google Authenticator and any TOTP app for Two-Factor Authentication

Since the very beginning, Cloudflare has offered two-factor authentication with Authy, and starting today we are expanding your options to keep your account safe with Google Authenticator and any Time-based One Time Password (TOTP) app of your choice. If you want to get started right away, visit your account settings. Continue Reading

Ransomware And The Boot Process

Since its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage Continue Reading

IoT-based Linux/Mirai: Frequently Asked Questions

Ever since the Mirai DDoS attack was launched a few weeks ago, we have received a number of questions that I will try to answer here. If you have more follow-up questions, please let me know! Who is the Author of Mirai? The presumed developer goes under the pseudonym of Continue Reading

Securing Next-Generation Data Centers

Data Centers are undergoing the most radical transformation since they were first created. For decades, they were walled off and isolated vaults containing some of an organization’s most valued assets. Only a handful of data center shamans were authorized to query that data center for information. It’s no coincidence that Continue Reading

Innovation Insights: Defining Open with the Fortinet Security Fabric

Securing networks has been a serious challenge ever since DEC salesman Gary Thuerk sent the first spam message to 400 unsuspecting users of the ARPANET back in 1978. Sure, security devices have become more sophisticated over time, and their evolution is a fascinating subject. But they all tend to suffer Continue Reading

Encryption Week

Since CloudFlare’s inception, we have worked tirelessly to make encryption as simple and as accessible as possible. Over the last two years, we’ve made CloudFlare the easiest way to enable encryption for web properties and internet services. From the launch of Universal SSL, which gives HTTPS to millions of sites Continue Reading

>