3 Safety Tips On Empowering Your Employees to Work from Home Securely during the COVID-19 Pandemic!

17/03/2020 15:09:17

The coronavirus outbreak has triggered a serious need for remote computing on a grand scale. Organizations are requiring employees and students to work and learn from home ...

[Alert] Microsoft SMBv3 Remote Code Execution Vulnerability

17/03/2020 11:43:40

Microsoft Server Message Block (SMB) protocol is a Microsoft network file sharing protocol used in Microsoft Windows....

Sangfor Incident Response Services

16/03/2020 14:06:41

Those who forget history are doomed to repeat it....

Fastjson JtaTransactionConfig Remote Code Execution Vulnerability

06/03/2020 14:42:22

Fastjson is a high performance and fully functional JSON library written in Java. It uses the algorithm of assumed ordered fast matching to...

Well-Rounded Incident Response is Vital

05/03/2020 09:47:09

Cybersecurity has become the crux of the Internet age, having a profound impact on international politics, economy, culture, society, military and almost every other field, ...

Why Fighting Ransomware is an Uphill Battle

27/02/2020 08:54:35

Ransomware is the fastest growing cyberthreat today. Where national governments and large enterprises were once the primary targets, now local governments and smaller organizations have become victims, with operations shutdown days or weeks unless the exorbitant ransom is paid....

Sangfor Talks Targeted Ransomware at RSA

26/02/2020 13:28:20

RSA is underway in San Francisco and, as expected, the focus is Ransomware. The first day of RSA provided a full day focused on ransomware, targeted attacks, and emerging threats like social engineering and deep fake human manipulation. ...

Apache Dubbo Deserialization Vulnerability CVE-2019-17564

20/02/2020 15:46:16

Apache Dubbo is an open high-performance, light weight, Java based RPC framework....

Log4j Deserialization Remote Code Execution CVE-2019-17571

04/01/2020 10:14:06

Log4j is a open-source project of Apache By using Log4j, the destination of log transfer can be controlled as console, file, GUI component, and even socket server, NT event logger, UNIX Syslog daemon, etc. The output format of each log can also be controlled....

Managing Third-Party & Supply Chain Risk with Sangfor

24/12/2019 11:20:09

What is more beautiful than a partnership with someone you trust? A marriage. A friendship. A merger. A supplier....

Our Social Networks

Global Service Center:

COPYRIGHT © 2000-2020 SANGFOR TECHNOLOGIES. ALL RIGHTS RESERVED.