Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links.
We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site.
To control third party cookies, you can also adjust your browser settings.
Sophos Anti-Virus for Linux 9.11.0 +. Successful Secondary update message still prefixed with 'update.failed' in messages/syslog following after unsuccessful Primary update16 nov 2016
Advisory: SFOS outage during user authentication06 nov 2016
Advisory: Winlogon.exe detected as Troj/FarFli-CT08 sep 2016
Advisory: Response to Vulnerability SF01V - Persistent Web Vulnerability08 jun 2016
Updates failing on Linux Endpoint when updating from Linux/Unix based CID hosted on parent Linux machine on 9.11.x.02 jun 2016
Advisory: Increasing number of SPAM reports on UTM<Issue resolved>04 abr 2016
Advisory: Issues you may experience after updating to UTM 9.3 and workarounds04 abr 2016
Sophos Anti-Virus for Linux 9.11.0 / 9.11.1. Talpa Binary Packs update January 22nd 201629 ene 2016
Advisory: Several vulnerabilities found in OpenSSL affecting Sophos products20 ene 2016
Advisory: Recommended steps for the Poodle vulnerability in SMTP Proxy on the Sophos UTM18 sep 2015
Advisory: High memory usage on UTM caused by named & ATP18 sep 2015
Advisory: OpenSSL Security Advisory [05 Jun 2014]09 sep 2015
SSL/TLS (FREAK) vulnerability: affected Sophos products and versions26 ago 2015
Mac OS X 10.11 Beta not supported by SAV for OS X10 jul 2015
Advisory: What to do if log files are not visible in WebAdmin after updating to Sophos UTM 9.21010 abr 2015
Advisory: Workaround for RED issues (Bug ID 34563 and 34558) in Sophos UTM v9.30827 feb 2015
Advisory: Vulnerability NTP CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-929628 dic 2014
Sophos Ltd. Todos los derechos reservados.