Category: Security

Identify a piece of malware with Yara

Yara rules classify and identify malware samples by creating descriptions of malware families (it is a tool used to identify files, based on textual or binary pattern). YARA rules are like a piece of programming language, they work by defining a number of variables that contain patterns found in a sample of malware. If some …

Continue reading

Advertisement

VMware Explore General Session Recap

VMware Explore General Session Recap – Looking forward to an exciting week full of knowledge acquisition and networking, the event has begun with the General Session at VMware Explore in Barcelona. Basically, the keynote provides some very good techie announcements, but it needs to also apply more of a business perspective of how these deliver …

Continue reading

Advertisement

Veeam v12 Platform Overview

Veeam Platform v12 advances enterprise-grade recovery capabilities that ensure confidence in the face of disaster or cyber attack. New direct-to-object storage, advanced cloud application backups (Veeam Backup for Salesforce), greater cyber security protection, and operational efficiencies allow you to protect mire and recover faster, all from a single platform, and new features in v12.

Continue reading

Advertisement

List of vendors and software affected by the OpenSSL vulnerability

On this page we display a list of vendors and their software affected and not affected by the OpenSSL vulnerability in version 3.X. This page is being updated as soon as we issue the corresponding security bulletin and according of the feedback of the vendors.  

Continue reading

Critical OpenSSL Vulnerability version 3.0

Updated (October 27th, 2022): List of vendors and software affected by the OpenSSL vulnerability here. Critical OpenSSL Vulnerability version 3.0 and above: OpenSSL has just announced a critical vulnerability in version 3.x. This access vulnerability requires access to private keys and/or risks remote machine access (RCE). Vulnerabilities that can be easily exploited remotely to compromise …

Continue reading

error

Enjoy this blog? Please spread the word :)