May 9, 2024 | Uncategorized
The syslog-ng Store Box (SSB) appliance is built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of the typical use cases for SSB (and syslog-ng PE) is...
Apr 23, 2024 | Uncategorized
Data breaches have become more common today. More importantly, the most newsworthy data breaches that occur are malicious, whether that is an individual or gang involved with ransomware or a disgruntled employee trying to settle a score. High-profile, large companies...
Apr 18, 2024 | Articles, Articles, Articles, Articles
A novel backdoor (CVE-2024-3094) was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with...
Apr 18, 2024 | Uncategorized
Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind the IT sector, such as banking and retail. For example, ransomware attacks on OT systems are on the rise with twice as many...