Stonefish - SIEM Stonefish

Stonefish is a SIEM system crafted for enterprise of any size. Traditional SIEM solutions are typically expensive, hard to deploy and maintenance. Results analysis require appropriate human resources and their appropriate training.

Barracuda On Demand Compliance on demand

Barracuda Security Scanner (BSS) is delivered in SaaS model and is available through web browser. It allows testing of any IP address or URL, anytime, any number of times. In order to ensure accountability, Bank can archive all of previous reports in BSS and obtain previous versions.

Latest vulnerabilities

A free version is refreshed once per day. To learn more, click here.

Blog

Critical vulnerability in OpenSSH client (CVE-2016-0777, CVE-2016-0778)

OpenSSH client versions 5.4 through 7.1 are affected by memory leak vulnerability that allows private key theft. In case when SSH connection is interrupted (e.g. by network ...

2016-02-01 09:30, more Więcej
Microsoft limits support to IE 11 only

Starting today Microsoft supports only Internet Explorer 11 (or higher in future). This means for many systems like Windows 7 that are running older versions of this web browser to ...

2016-01-13 09:00, more Więcej
SafeNet Day: Encryption in the cloud - presentation

Aleksandra Czarnowski's presentation from SafeNet Day entitled Cloud encryption (Szyfrowanie w chmurze) is available for download. Please follow the link below:

http://www.avet.com.pl/media/pdf/2015-11-02_Szyfrowanie_w_chmurze ...

2015-10-31 10:00, more Więcej
Encryption in the Corporate Cloud

AVET Information and Network Security in cooperation with InfoSec Institute, has created a document concerning data encryption matters in cloud computing environments. Introduction to the topic is below, however the ...

2015-10-19 12:00, more Więcej
Logjam vulnerability in Diffie-Hellman algorithm

According to the https://weakdh.org/ website:

The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows an attacker to read and ...

2015-06-09 09:00, more Więcej