Security Notifications and Alerts

Security is a top priority at SOTI. We are committed to providing our customer world-class products, services and support.  Part of this commitment includes keeping our customers updated about new or reoccurring security vulnerabilities to prevent any data loss and end-user downtime.

  • Meltdown and Spectre

    Meltdown and Spectre The Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715) vulnerabilities have been featured prominently in both technical and mainstream news. These vulnerab... Read More

  • WannaCry Ransomware

    WannaCry Ransomware The WannaCry exploits a specific vulnerability in Microsoft Windows Server SMB services identified in Microsoft bulletin MS17-010 released on March 14, 2017. The same security ... Read More

  • DROWN Vulnerability

    The recently announced Drown attack is a new technique for reading the contents of secure messages. This vulnerability affects computers that run a type of protection known as SSLv2, and through ob... Read More

  • Quicksand Vulnerability

    A vulnerability was recently discovered in the Sandbox_profiles component included in versions of Apple iOS before 8.4.1. The vulnerability, dubbed Quicksand, enables an attacker to bypass the thir... Read More

  • Logjam

    On May 19, 2015 a team of researchers announced the discovery of a flaw in the Transport Layer Security (TLS) cryptographic protocol used to protect many web sites and email servers. The vulnerab... Read More


    On May 13, 2015 the discovery of a buffer overflow bug, dubbed VENOM, was announced. The bug resides in the code for a low-level floppy disk controller used in the Xen, KVM, and native QEMU virtu... Read More

  • FREAK Vulnerability

    A vulnerability has been discovered in several implementations of the SSL/TLS protocols used to secure many web sites. This vulnerability, known as FREAK (Factoring RSA Export Keys), would enable... Read More

  • GHOST Vulnerability

    On January 27, 2015 a heap-based buffer overflow bug, commonly known as 'GHOST', was discovered in the gethostbyname() functions in the glibc library. glibc is the GNU implementation of the C stand... Read More

  • Schannel

    A critical vulnerability has been discovered in the Microsoft Secure Channel (Schannel) security component on Windows. The vulnerability enables an attacker to remotely execute malicious code on a... Read More

  • SSL Poodle Vulnerability

    A vulnerability has been discovered in SSL 3.0 protocol. This vulnerability is known as POODLE (CVE-2014-3566)   SOTI MobiControl utilizes the implementation of SSL and TLS provided by Microsoft i... Read More

  • ShellShock

    SOTI MobiControl helps enterprises protect against vulnerabilities in operating systems that can affect your enterprise’s day-to-day technology-driven operations. Most recently, a new vulnerabilit... Read More

  • Heartbleed

    Heartbleed, a security threat targeting organizations that have trusted OpenSSL to protect their data, has allowed hackers to steal data from approximately 15% of websites via an OpenSSL encryption... Read More