May 9, 2024 | Uncategorized
The syslog-ng Store Box (SSB) appliance, built on syslog-ng Premium Edition (PE), offers a user-friendly graphical interface while retaining most of syslog-ng PE’s robust features. A key application of SSB and syslog-ng PE is enhancing the logging infrastructure...
Apr 23, 2024 | Uncategorized
Data breaches have become increasingly common today. Notably, the most newsworthy breaches are often malicious, involving either ransomware gangs or disgruntled employees seeking revenge. High-profile, large companies targeted by cyberattacks often face ransom demands...
Apr 18, 2024 | Articles, Articles, Articles, Articles
Recently, a new backdoor (CVE-2024-3094) was uncovered within the build system of the widely utilized xz-utils ‘liblzma’ data compression library. This backdoor is purportedly aimed at the OpenSSH server but has the capability to affect any application...
Apr 18, 2024 | Uncategorized
Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind the IT sector, such as banking and retail. For instance, ransomware incidents targeting OT systems have surged, doubling in 2022...