888.624.6737

syse-blog-header

Systems Engineering

Recent Posts

SECURITY ALERT: Authentication Bypass Security Vulnerability Found in Fortinet Firewalls and Web Proxies

October 10, 2022

Systems Engineering is aware of the following security vulnerability in Fortinet operating systems, FortiOS: CVE-2022-40684 / FG-IR-22-377.

Read More »

Security Bulletins & Alerts

Systems Engineering Announces Security Operations Partnership with Arctic Wolf

September 08, 2022

Systems Engineering SE EventWatch Powered by the Arctic Wolf Security Operations Cloud Now Provides Clients Industry-Leading Cybersecurity Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks.

Read More »

Announcements

SECURITY ALERT: VMware Tools local privilege escalation vulnerability

August 26, 2022

On Tuesday, August 23, an advisory notification was released by VMware, the virtualization technology software firm, announcing a local privilege escalation vulnerability (CVE-2022-31676). Updates are available to remediate this vulnerability in affected VMware products.

Read More »

Security Bulletins & Alerts

SECURITY BULLETIN: Mitel MiConnect VOIP Zero-Day Vulnerability

June 28, 2022

Several cybersecurity research groups have identified and studied the use of a Zero-Day vulnerability found in the Mitel VoIP MiConnect solution, CVE-2022-29499. The vulnerability exists due to improper input validation in the Mitel Service Appliance. A cyberattacker can send a specially crafted HTTP GET request to the application and execute arbitrary Operating System commands on the target system. Successful exploitation of this flaw may result in the complete compromise of the vulnerable system. This vulnerability has been successfully exploited by at least one ransomware group.

Read More »

Security Bulletins & Alerts

Data Breach: 5 Critical Questions Answered

June 13, 2022

Since 2008, Verizon has released its annual Data Breach Investigations Report (DBIR). This is a data-driven report on threats your organization may encounter in regard to cybercrime. The threats identified are the most common tactics used against organizations that resulted in a data breach.

Read More »

Cybersecurity

5 Qualities of a Reliable Cloud Migration Partner

May 05, 2022

Have you decided to relocate some or all of your organization's infrastructure to a cloud services provider (CSP) such as Microsoft, Google, or Amazon? If so, the next step is to consider who will serve as your cloud migration partner. The right consultant can get you to the cloud securely and cost-effectively while enhancing performance. But ... not all cloud migration partners are created equal.

Read More »

Business Transformation, IT Solutions & Support

3 Practical Tips for Creating Strong Passwords

April 08, 2022

Recent world events involving domestic cyberthreats and debilitating ransomware attacks on critical U.S. infrastructure have prompted private corporations and the government alike to place a renewed urgency on cybersecurity and network defense measures.

Read More »

Network Security