Jan 17 2017
DMARC is changing the world of email. Learn about DMARC and what it is doing for email in this easy to follow overview.
Link to more information on dMarcian.
Apr 20 2016
Finally Checkpoint changed the way how objects are stored with the R80 release. This release is only running management, wonder when the gateways will be available.
Installed this version in a VMware ESXi 5.5 environment with not problems, at the moment it is running with 3Gb of memory at that is not enough. The swap is already used for 35% and it is only running the Gaia portal, management – and log server no active connections from Smart Console users or logging from gateways.
Check Point R80 release notes.
May 21 2015
Well-known cryptography professor Matthew Green has discovered a new SSL vulnarability.
Diffie-Hellman key exchange is a popular cryptographic algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is fundamental to many protocols including HTTPS, SSH, IPsec, SMTPS, and protocols that rely on TLS.
We have uncovered several weaknesses in how Diffie-Hellman key exchange has been deployed:
May 18 2015
VENOM (Virtualized Environment Neglected Operations Manipulation)
CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host’s local network and adjacent systems.
Exploitation of the VENOM vulnerability can expose access to corporate intellectual property (IP), in addition to sensitive and personally identifiable information (PII), potentially impacting the thousands of organizations and millions of end users that rely on affected VMs for the allocation of shared computing resources, as well as connectivity, storage, security, and privacy.
What products are affected: