Summary of the Investigation Related to CVE-2023-0669

Summary of the Investigation Related to CVE-2023-0669

We’d like to provide an update on our investigation into the suspicious activity detected in our Fortra GoAnywhere MFT solution. Working with Unit 42, we have completed our investigation and have compiled a factual summary of the investigation, as well as continuous improvement actions Fortra is taking to further strengthen our systems and recommended actions customers can take to secure their data and improve their security posture using available features in the GoAnywhere MFT solution.

Syslog-ng 101, part 7: Networking

Syslog-ng 101, part 7: Networking

This is the seventh part of my syslog-ng tutorial. Last time, we learned about syslog-ng destinations and the log path. Today, we learn about syslog-ng network logging. At the end of the session, we will send test messages to a syslog-ng network source.

Security Awareness Training ROI: Part 2 Of 3

Security Awareness Training ROI: Part 2 Of 3

If you haven’t read Part 1 of our Security Awareness Training ROI, you can here. In it, we discussed the high-level overview of why security awareness training should be a vital part of any company’s cybersecurity strategy and how to get the best security awareness training ROI.

Open-Source SSH: When Free Is Not Free

Open-Source SSH: When Free Is Not Free

Free software, also known as open-source software, sounds like a good way to cut already high IT costs. As the name suggests, it’s free, thus it shouldn’t cost anything. But is it really that simple? Let’s find out.

Syslog-ng 101, part 6: Destinations and log path

Syslog-ng 101, part 6: Destinations and log path

This is the sixth part of my syslog-ng tutorial. Last time, we learned about syslog-ng source definitions and how to check the syslog-ng version. Today, we learn about syslog-ng destinations and the log path. At the end of the session, we will also perform a quick syntax check.

White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

Splunk is a popular search and analysis platform. Many users of Splunk also have syslog-ng™ deployed in their environments. This guideline describes scenarios in which Splunk users can benefit from syslog-ng™ Premium Edition features and offers some technical guidance to optimize the syslog-ng™ configuration.

SSH in the World of Post-Quantum Cryptography (PQC)

SSH in the World of Post-Quantum Cryptography (PQC)

Nowadays, advances in quantum computing are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking point, the threat to classical, public key cryptography is getting closer.  

Understanding attack paths targeting Active Directory

Understanding attack paths targeting Active Directory

Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more.

Syslog-ng 101, part 5: Sources

Syslog-ng 101, part 5: Sources

This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled features.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877