We’re excited to announce the release of RELIANOID Load Balancer Enterprise Version 6.2.33, packed with several improvements and bug fixes to enhance your load balancing experience. Below are the detailed...
OWASP Top 10 Overview The OWASP Top 10 is a globally recognized standard for understanding and addressing the most critical security risks to web applications. Developed by the Open Web...
On March 5, 2024, Meta Platforms Inc., the parent company of Facebook, Instagram, and Threads, experienced a global outage that left millions of users unable to access their accounts for...
We are excited to introduce RELIANOID 6.2.32 Load Balancer (Enterprise Edition) on the February 5th, 2024, showcasing a series of improvements and critical bug fixes to fortify system security and...
The widespread adoption of virtualization in recent years has revolutionized the efficiency and scalability of IT infrastructure, offering cost-effective solutions to businesses. While over 90% of organizations have embraced server...
A critical vulnerability has been identified in SSH ProxyCommand, marked as CVE-2023-51385, with a severity rating of 9.8 on the CVSS scale. This flaw poses a significant risk, potentially allowing...
In a recent incident (last 3rd January), Orange Spain encountered a significant internet outage due to a cyberattack that targeted the company’s RIPE account. The threat actor, identified as ‘Snow,’...
Emerging threats demand continuous attention to fortify businesses against potential vulnerabilities. Recently, researchers uncovered a critical flaw in the SSH cryptographic network protocol, identified as CVE-2023-48795. Known as the Terrapin...
Sberbank, a major Russian financial institution, recently disclosed that it encountered an exceptionally potent distributed denial of service (DDoS) attack, marking it as the most formidable in recent history, according...
A campaign known as “Stayin’ Alive” has been actively targeting government organizations and telecommunication service providers across Asia since 2021. Aim of the attack Employing a diverse array of “disposable”...