Struts2 was exposed high-risk vulnerability, NGAF will protect you !

27/04/2016 10:25:03

Struts2 was exposed high risk vulnerability s2-032, CVE-2016-3081, attackers could execute arbitrary remote commands through this vulnerability.The financial industry has become the hardest hit by this vulnerability for the moment,other web site which uses Struts2 open source framework should do the security work in time....

Locky Ransomware Virus

30/03/2016 10:30:03

Locky ransomware virus often spreads via emails and malicious links to Trojans. Once the file infected with the Locky virus is downloaded, it runs automatically and deletes the ransomware sample to evade anti-virus detection. Then, the Locky virus leverages Internet access permission to connect to the C&C server controlled by a hacker in order to upload information from infected endpoint devices and download a private key from the C&C server, which will be written into the registry. Therefore, files in all local disk drives will be traversed and encrypted, and texts will be presented in desktop to tell victims to pay the ransom (using BitCoins in most cases)....

Safeguard your employees against Ransomware !

22/03/2016 16:12:27

Getting infected with Ransomware always end up costing the victims thousands of dollars. The cyber-thieves’ malware works by either holding your entire computer hostage or by blocking access to all of your files by encrypting them. The Ransomware victim is typically ordered to finish the required payment in order to get the key to unlock their encrypted data....

Security Expertise as a Service - Vision to Renovate Commercial Security Solution

17/03/2016 14:58:52

To have competent technical staff dealing with skillful hackers & cyber threat risks is not realistic for most of organizations. Even when there are staff with high expertise, effective threat visibility tools are essential to assist on the risk mitigation operation. ...

WebSVN 2.3.3 Cross Site Scripting Vulnerability

12/03/2016 10:30:48

WebSVN offers a view onto your subversion repositories that's been designed to reflect the Subversion methodology. You can view the log of any file or directory and see a list of all the files changed, added or deleted in any given revision. You can also view the differences between two versions of a file so as to see exactly what was changed in a particular revision....

Popular WordPress Plugin Comes with a Backdoor, Steals Site Admin Credentials

11/03/2016 15:05:01

Security researchers have unmasked the wicked actions of a WordPress plugin that was installing a backdoor through which it was altering core WordPress files so it could log and steal user credentials from infected sites....

New Year, New IAM Version with Many Exciting Features !

07/03/2016 09:14:55

Sangfor launched the new IAM 11.0 firmware at the end of 2015. With the growing number of mobile users bringing their own devices (BYOD) to work, it is necessary for enterprises to find a way to protect & manage its network. ...

DROWN Attack - More than 11 Million OpenSSL HTTPS Websites at Risk

02/03/2016 11:00:02

A new deadly security vulnerability has been discovered in OpenSSL that affects more than 11 Million modern websites and e-mail services protected by an ancient, long deprecated transport layer security protocol, Secure Sockets Layer (SSLv2). ...

How Just Opening an MS Word Doc Can Hijack Every File On Your System

22/02/2016 10:55:35

If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it....

The Worst Passwords of 2015

25/01/2016 14:22:25

SplashData, a developer of password management software, has published its annual list of the most common (worst) passwords people used with their online identities....

Our Social Networks

Global Service Center:

COPYRIGHT © 2000-2017 SANGFOR TECHNOLOGIES CO., LTD. ALL RIGHTS RESERVED.