Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links.
We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site.
To control third party cookies, you can also adjust your browser settings.
Sophos Anti-Virus for Linux 9.11.0 +. Successful Secondary update message still prefixed with 'update.failed' in messages/syslog following after unsuccessful Primary update16 nov 2016
Advisory: SFOS outage during user authentication06 nov 2016
Advisory: Winlogon.exe detected as Troj/FarFli-CT08 set 2016
Advisory: Response to Vulnerability SF01V - Persistent Web Vulnerability08 giu 2016
Updates failing on Linux Endpoint when updating from Linux/Unix based CID hosted on parent Linux machine on 9.11.x.02 giu 2016
Advisory: Increasing number of SPAM reports on UTM<Issue resolved>04 apr 2016
Advisory: Issues you may experience after updating to UTM 9.3 and workarounds04 apr 2016
Sophos Anti-Virus for Linux 9.11.0 / 9.11.1. Talpa Binary Packs update January 22nd 201629 gen 2016
Advisory: Several vulnerabilities found in OpenSSL affecting Sophos products20 gen 2016
Advisory: Recommended steps for the Poodle vulnerability in SMTP Proxy on the Sophos UTM18 set 2015
Advisory: High memory usage on UTM caused by named & ATP18 set 2015
Advisory: OpenSSL Security Advisory [05 Jun 2014]09 set 2015
SSL/TLS (FREAK) vulnerability: affected Sophos products and versions26 ago 2015
Mac OS X 10.11 Beta not supported by SAV for OS X10 lug 2015
Advisory: What to do if log files are not visible in WebAdmin after updating to Sophos UTM 9.21010 apr 2015
Advisory: Workaround for RED issues (Bug ID 34563 and 34558) in Sophos UTM v9.30827 feb 2015
Advisory: Vulnerability NTP CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-929628 dic 2014
Sophos Ltd. Tutti i diritti riservati.