Last week, Lucee released new stable versions to address multiple security vulnerabilities affecting all previous software versions. The Lucee team advises updating to the latest stable release, version 5.4.3.2, immediately.  If you’re running an older version of Lucee, the following versions have backported stable releases:     • 5.3.9.173    • 5.3.8.237    • 5.3.7.59 The Lucee […]

Read More →

Earlier this month, Vivio’s President, Mark Keymer, was interviewed by HostAdvice. Can you tell us something about the beginning of the company? When it was founded? What was the idea behind it? Vivio Technologies was originally created in 2002 to be the company around a traffic exchange site. We worked on that product for the […]

Read More →

TLDR: Verify that the hotfix has been applied to your Sophos Firewall v18.5 MR3 (18.5.3) and older. Vulnerability Name: CVE-2022-1040 What does it do? An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code. What operating systems/software versions are affected? Sophos Firewall v18.5 MR3 (18.5.3) and older. Why […]

Read More →

TLDR: Verify that you’re running a secure Linux kernel version. Vulnerability Name: CVE-2022-0847 or “Dirty Pipe” What does it do? This flaw in the Linux Kernel can be easily exploited, giving a local user the ability to overwrite data in read-only files. What operating systems/software versions are affected? Linux Kernel 5.8 and later versions are affected, but it’s […]

Read More →

We’ve finished the pricing updates for ColdFusion, Windows, cPanel, and Sophos licensing. If you’re on one of the plans listed below, you’ll see these new prices reflected on/or after your invoice for the April service period. If your plan is not shown in the list below, we’re still converting your services to the new plans, […]

Read More →
A businessman stands behind a transparent grid while pointing to the word "ransomware."

What is Ransomware? Ransomware is malicious encryption software used to take control over an organization’s data. After the data is encrypted, the attacker will demand payment in exchange for the decryption key, usually in the form of cryptocurrency. Why is it so difficult to prevent ransomware attacks? Ransomware is a highly-competitive industry and continually evolving […]

Read More →