+971 4 254 1982
sales@securepoint.ae
 

Blogs

We are pleased to announce Fortinet has been named a Leader in The Forrester Wave™: Enterprise Firewalls, Q4 2022 report. We believe our position as a Leader is a testament to our investment in providing a Next-Generation Firewall (NGFW) solution that serves as an enabler of digital acceleration, made possible through the convergence of advanced networking and security capabilities. We are proud to be selected as...

Read More

A recent out-of-band patch from Microsoft resolves a vulnerability in how of Windows 10 and Server 2019 handle decompression in the file sharing protocol SMBv3. According to Microsoft, a successful exploit of this vulnerability by an attacker could enable remote code execution over a network using SMB. More specifically, an unauthenticated attacker could send a crafted message to a server and take over the server. The attacker...

Read More

Linux 4.13 won’t be delayed – Linus Torvalds   Linus Torvalds has released the latest Release Candidate development snapshot of the Linux 4.13 kernel series, Softpedia reported.   The release of RC5 coincided with Torvalds stating that the Linux 4.13 kernel series should not suffer any delays.   “As for the changes implemented in Linux kernel 4.13 RC5, we’re looking at the patch containing about 40% updated drivers, just under 40%...

Read More

Some experts worry that the dark web is becoming too commercial, making it easier than ever to hire hackers   Cyber-criminals are becoming more efficient and organized online. The dark web, a term that means the parts of the Internet that require specific software, configurations or authorization to access and often sell illegal goods and services, is evolving into a full-fledged business. This underground criminal-lead market now...

Read More

Cloud-based services have revolutionized cyber security. Repeatedly, cloud providers have demonstrated that their systems can outcompete onsite solutions in terms of effectiveness, efficiency, and security. Indeed, the cloud makes it possible to easily and safely outsource certain aspects of a company’s IT systems to a capable cloud provider. In addition, cloud-based services are less resource intensive for the client company and can therefore be an...

Read More

Fileless malware seems to be rearing its head. So how do you protect your organization against attacks that have no files to scan?   Executing attacks in memory rather than through executable files seems to be coming back strongly. Last year saw some visible attacks e.g. against several banks with this technique, which as such is nothing new, but has now made a comeback.   The term ‘fileless’ is...

Read More