Compromised, now what?

The online threat landscape is ever-changing. Recently, a functional Microsoft Remote Desktop exploit was publicly released that allows an attacker to gain System access; furthermore, all versions of the popular email delivery software EXIM is reported to be remotely exploitable, enabling an attacker with superuser access to 57% of the worlds email delivery systems.

Red Piranha continues to raise the bar achieving 60Gbps IDS/S Suricata thruput in recent testing

Red Piranha’s Crystal Eye UTM appliances are multi-core systems that enable multi-threaded applications to use the underlying hardware for high performance. Multi-threading scales the system by adding more threads for running different applications which inspect the incoming traffic before transmitting it to the protected network.