Contronex | Security Solutions Distributor for Managed Solutions Partners
  • Home
  • Products
    • Bitdefender
    • IBM MaaS360
    • usecure
    • AppMoat by Seventh Knight
    • HornetSecurity
    • TechSafe
    • G DATA
    • Secure Disk for Bitlocker
    • SecureSafe
    • FileCap
    • Blue Shield
  • Support
    • Product Support
    • Downloads
    • Frequently Asked Questions
  • Contact Us
    • Request A Quote
    • Contact Information
  • Blog
  • Partners
Select Page

PlayStation Now Fixes Vulnerability That Allowed Attackers to Run RCE on Windows PCs

A critical flaw in the PlayStation Now cloud application could have let attackers inject malicious code on Windows-operating devices. The vulnerability was reported on May 13 by bug hunter Parsia Hakimian, and fixed on June 25 by the online gaming giant. The bug,...

Foxconn hit with record-breaking $34 million ransom demand after cyber attack

Electronics manufacturer Foxconn was infected with the DoppelPaymer ransomware last monthHacking group has begun to publish files stolen from company’s servers during the attack The world’s largest electronics manufacturer, Foxconn, has suffered a cyber...

Israel shaken by data leak after ransomware attack at Shirbit insurance company

Hackers leak screenshot of negotiation with breached insurance giantIsraeli government reportedly reconsidering relationship with insurance firm following security breach A hacking gang calling itself Black Shadow has demanded a giant insurance firm pay a US $3.8...

Data Breach at Alaskan Online Voter Registration System Exposes Personal Info of Over 100,000 Voters

A cyberattack on the Online Voter Registration System of the state of Alaska exposed the personal information of 113,000 potential voters, the Governor’s Office announced last Thursday. According to a press release, the attack took place in early September, and was...

Italian Police Arrest Criminals Accused of Robbing ATMs with Purpose-Built Black Boxes

Italian Police identified 12 people allegedly responsible for numerous ATM jackpotting attacks in multiple provinces, putting an end to a criminal operation that lasted seven months. Jackpotting usually requires several attackers. It’s one of the more complex methods...
« Older Entries
Next Entries »

Recent Knowledge Base Articles

  • How to remove Add-On Modules from a company
  • How to Add/Remove Modules (Reconfiguring an Endpoint)
  • Phone no longer paired for 2FA
  • How to remove AD integration
  • Bitdefender install fails because of pre-existing endpoint solution
  • How to temporarily turn off on-access scanning
  • How to sync endpoints with Active Directory?
  • How to give a customer access to his GravityZone?
  • System requirements for modules
  • How to PERMANENTLY delete an endpoint?

Knowledge Base Categories

  • Bitdefender
  • G DATA
  • Facebook
  • X
  • Instagram
  • RSS

©2025 Contronex, Inc. | 108 10th Street North | Naples, Florida 34102 | 239-649-7836