FreePBX Security Vulnerability

A recent vulnerability has surfaced with FreePBX version 2.10 and lower. The callme_startcall function in recordings/misc/callme_page.php in FreePBX allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action. Affected Systems FreePBX v2.10 and Lower Elastix v2.4 Recommended Steps Disable Wan access to web portal of Freepbx/Elastix For More Information visit

Cisco ASA Security Advisory

Cisco has released a security advisory for a vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to a buffer overflow in

Will Aruba be the next Palm?

While some of Aruba Networks’ competitors are circling like vultures on a dead carcass, the company says it’s very much alive and well, thank you very much. Competitors will say what they will while Aruba prepares to become a larger force with the help of HP’s breadth and scale, but you can’t blame them–and everyone

Yoast Security Vulnerability Notice!

There is a new vulnerability affecting popular WordPress plugin Yoast. If you’re using the plugin, update it to the most recent version to protect you and your customers from attack. What is Yoast, and what is the vulnerability? Yoast is an SEO plugin for WordPress. Versions of the plugin prior to are vulnerable to

The Industry’s First 802.11ac UTM Firewall

The Cisco Meraki MX64 and MX64W combine higher speed with Unified Threat Management for branch sites. We’re thrilled to announce exciting, first-of-its-kind hardware for our security product line: a comprehensive Unified Threat Management (UTM) box sporting an 802.11ac radio for blistering gigabit wireless. Our brand new Cisco Meraki MX64W Security Appliance for small branch sites

Phishing Alert

Important! We have noticed a few of our customers receiving a suspicious email that appears to be a phishing scam. We urge to not click on the link and provide any login details. if you receive an email from secure-online-settings[at] with the following message Dear Member, Please click here and login with your email to