CPE February Updates – Blog.CentOS.org

CPE – Community Platform Engineering – is the engineering group within Red Hat which does a lot of the behind-the-scenes work that makes the CentOS and Fedora projects possible. We would like to welcome you all to our first blog update on the CentOS Stream initiative. Over the course of Continue Reading

CVE-2019-0708 – Remote Desktop Protocol and Remote Code Execution #Bluekeep

On May 14th, 2019, Microsoft released their usual set of updates, referred to within the industry as “Patch Tuesday.” At first glance, the inclusion of CVE-2019-0708 appeared to be similar to all the other updates released on that day—it included a writeup containing an overview of the update, including the Continue Reading

ISPConfig Billing Module 2.0.1 released

ISPConfig Billing Module 2.0.1 released – ISPConfig Please click here if you are not redirected within a few seconds. The ISPConfig Billing Module 2.0.1 has been released. This update fixes some minor issues in the ISPConfig Billing Module. Resolved issues Payment date is set automatically when paid checkbox is unchecked. Continue Reading

Healthcare Cybersecurity Risks in The Internet of Medical Things

Due to the sensitive information housed within medical records (social security numbers, addresses, medical claim data etc.), healthcare has always been one of the most frequently targeted industries by cybercriminals. Hackers who are able to successfully steal this data can profit in a big way as this data has high value Continue Reading

Threat Intelligence Cyber Defense, Part 3 of 3

In my last blog we discussed some high level defensive tactics we can take within each phase of the attack chain, once we understand the attacker’s attack methodologies, in order to build a more intelligent defensive posture.  (https://blog.fortinet.com/post/threat-intelligence-cyber-defense-part-2-of-3)Now in this final blog in this series, I will take a look Continue Reading

Securing Business-to-Business Environments

Business to Business, or B2B networks are pervasive within Financial Services network environments. They are also highly vulnerable to attack.  One reason is that these networks are often woefully unprotected. Some organizations have implemented simple firewall capabilities into these B2B networks, and most have VPNs. But because performance is paramount, Continue Reading