IBM Rational Collaborative Lifecycle Management XSS Vulnerability

At the beginning of this year, I discovered and reported a Cross-Site Scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management (CLM). This month IBM released a security bulletin that contains the fix for this vulnerability. In this blog, I want to share the details of this vulnerability. How to Continue Reading

ISPProtect Malware Scanner 1.12 released

The ISPProtect Malware Scanner 1.12 has been released today. This release adds a new whitelisting feature and an option to ignore specific types of malware. What is ISPProtect? ISPProtect is a Malware and Antivirus scanner for web servers. It contains a signature based scan engine and a heuristic scan engine Continue Reading

Zimbra Mobile Plus – How to configure Microsoft Outlook 2013 with shared resources using ActiveSync

Hello, Everyone. In this blog post, I will present another great feature from the new Zimbra Suite Plus. This feature provides the ability to synchronize shared resources in the Zimbra Web Client using ActiveSync, which can then be shared to any device on any platform. In this post, I will Continue Reading

Security’s Reactive Response to the Cycle of Threats

We’re into the final quarter of the year, and the cyberthreat landscape continues to be interesting. This week in the Fortinet Threat Intelligence Brief we looked at a number of interesting trends around IoT botnets, continued ransomware problems – both through directed attacks and infected websites, and the spoofing of Continue Reading

Connection Management in Database Jones

How does an application configure its database connection?  I find this to be a pretty interesting question. As the application moves from a developer’s workstation to a test harness, then to staging, and on to production, the database connection properties can change each time.  What’s more, a separation of responsibilities usually Continue Reading

The Locky Saga Continues: Now Uses .odin as File Extension

As a result of our continuous monitoring of the Locky ransomeware we discovered a new Locky variant. This variant now appends a “.odin” extension to its encrypted files. This is now the third time that the extension has been changed. Aside from this, in this report we will also examine Continue Reading

Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms

This post was authored by Mike Schutz, General Manager, Cloud Platform. Security is a top-of-mind topic for every organization. This is why Microsoft is investing deeply to provide advanced security across our technology portfolio. With the launch of Windows Server 2016 this week, we introduced new advanced multi-layer security capabilities Continue Reading

Zimbra Suite Plus, Part II – Administration , quick overview

In our last blog post, we showed you how to download and install Zimbra Suite Plus. In this blog post, we are going to do a quick overview of the Administration Console and walk through each Zimbra Suite Plus component. Installing the Zimbra Suite Plus License Login into the Admin Continue Reading

Dissecting Mamba, the Disk-Encrypting Ransomware

Another new ransomware has joined the file-encrypting bandwagon. Only this time, instead of choosing what types of files to encrypt, it has decided to join the league of a few others and encrypt the entire disk directly using an open-source tool called DiskCryptor. This is not the first time that Continue Reading

>