Our Blog's Blog

🕒 Reading Time: 3 minutes The purpose of this article is to introduce you to our new Storage product. I’ll walk you through the ordering process, how to connect to your new storage, managing users, and accessing your storage through the various available methods. This service has launched as an early access program, and participants will receive their first 5GB free during this period of […]

🕒 Reading Time: 8 minutes Early in March, while studying the ChinaZ threat, it became readily apparent that default passwords were being used for more than just a supplementary attack vector. Several bots relied heavily, if not exclusively, on systems with weak and/or default passwords to spread. We setup a system with weak and default passwords to capture any and […]

🕒 Reading Time: < 1 minute On Wednesday, July 22nd the San Diego Laravel user group will be meeting at for two presentations. The first presentation is from Jason McCallister, talking about how to deploy Laravel applications to Heroku. The second presentation is from John Congdon, discussing Laravel Socialite, a module that makes it easy to use OAuth for logging […]

🕒 Reading Time: < 1 minute On Tuesday, July 21st members of the San Diego PostgreSQL Users Group will be meeting at Come out and join us for a presentation by Octavio Alvarez on a prototype project of his called “Quickbread”; which is a Generic CRUD UI for data stored in PostgreSQL. Please RSVP for the event at If […]

🕒 Reading Time: 2 minutes Did you know that is San Diego’s first PCI 3.0 compliant data center? It shows’s level of commitment when it comes to keeping your data safe and secure. If you’re not processing credit cards you may think PCI compliance is not relevant to your business, but this could not be further from the […]

🕒 Reading Time: 5 minutes Did the world listen? Historically speaking, vulnerability release follow-ups are usually pretty dismal. Honestly, I figured this would be the same old song and dance; “It’s been a year and nothing has changed”. I couldn’t be more wrong.   On June 19th 2014, we exposed possibly the worst type of vulnerability you could have in […]

🕒 Reading Time: 2 minutes Let me first start by thanking everybody who responded to our request for logs. Though many contributors have requested that I withhold attributing the data to them, several folks have given me the opportunity to credit them with their invaluable data, which will be done in the final report. Since the beginning of March, this […]

🕒 Reading Time: 3 minutes  Re-emergence of an old threat   Good Afternoon! Over the past couple weeks, we have been tracking a possible re-emergence of a threat group originating from China: CZT. The security team here at has done extensive research on this threat and is continuing to work with leading security companies as well as government agencies […]