Sophos XG Series Firewall Appliances Our XG Series hardware appliances are purpose-built with the latest multi-core Intel technology, generous RAM provisioning, and solid-state storage. Whether you’re protecting a small business or a large datacenter, you’re getting industry leading price:performance, and the ultimate in flexibility, connectivity and reliability in every form factor. Desktop Models Our Desktop firewall appliances support all ...
Read More »Blog
A new variant of Hawkeye keylogger ‘Reborn v9’ arises
HawkEye Reborn v9 is currently marketed as an ‘Advance Monitoring Solution’ and is currently being sold using a licensing model. HawkEye Reborn v9 also includes a ‘Terms of Service agreement’ which forbids buyers from using the software on systems without permission and from scanning its executables using antivirus software. A new variant of Hawkeye dubbed ‘Reborn v9’ has emerged. HawkEye ...
Read More »After FBI agents, hackers now release personal information of AAF members
In the last week, the hacker group who goes by the name of ‘PokemonGo Team’ had uploaded the personal information of several Federal agents. The hackers could have exploited a flaw in the third-party software used by the websites associated with the FBINAA in order to steal the data. The hacker group, who previously had exposed the personal information FBI ...
Read More »Unprotected database belonging to JustDial exposes personal information of almost 100 million users
The unprotected database exposed the personal information of almost 100 million users who accessed the service via its website, mobile app, or by calling its customer care number. The exposed data includes JustDial users’ names, email addresses, mobile numbers, location addresses, genders, dates of birth, photos, designations, company names, and more. What is the issue – A security researcher uncovered a ...
Read More »Next Generation Firewall
Next Generation Firewall A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus ...
Read More »Firewall Company in Mumbai
Firewall Company in Mumbai Cisco Firewall, Watch Guard Firewall, Fortigate Firewall security solutions. We provide support for setup of Virtual Private Network ( VPN ), Branch Office VPN and VPN Management Services. Cisco Firewall, Watch Guard Firewall, Fortigate Firewall, Firewall companies in India, Firewall company India, firewall installation company in Pune, firewall solutions, hardware based firewall provider, network firewall India ...
Read More »Firewall Company in Pune
Firewall Company in Pune Cisco Firewall, Watch Guard Firewall, Fortigate Firewall security solutions. We provide support for setup of Virtual Private Network ( VPN ), Branch Office VPN and VPN Management Services. Cisco Firewall, Watch Guard Firewall, Fortigate Firewall, Firewall companies in India, Firewall company India, firewall installation company in Pune, firewall solutions, hardware based firewall provider, network firewall India ...
Read More »GajShield Next Generation Firewall nu Series – 1160nu
GajShield Next Generation Firewall Appliances Provides complete visibility into various threats and performance inhibitors allowing organization to make informed and proactive security measure. Threat Management incorporates an ICSA certified firewall, Context based Data Leak Prevention System, Application Filtering, BYOD Policy management, VPN, URL Filtering, Gateway Antivirus, Intrusion Prevention System and Performance Management has Traffic Analysis, Network behavior analysis, Policy based ...
Read More »Attackers compromised Microsoft support agent’s credentials to access users’ email accounts
Attackers compromised Microsoft support agent’s credentials and gained access to view ‘limited’ number of users’ email account information. Upon learning about the incident, Microsoft immediately disabled the compromised support agent’s credentials. What is the issue – Microsoft notified its users via email that a certain ‘limited’ number of users who use web email services managed by Microsoft might have had their ...
Read More »Newly discovered RobinHood ransomware variant drops four ransom notes at once after encryption
RobinHood renames the encrypted files something similar to Encrypted_b0a6c73e3e434b63.enc_robinhood. The ransomware drops 4 ransom note with different names at the same time. A new ransomware named RobinHood has been found targeting computers within an entire network. The operators of the ransomware are so particular about victims’ privacy that they delete the encryption keys and IP addresses after the payment is ...
Read More »