Color logo - no background Piergiorgio Venuti

From Secure Online Desktop to Cyberfero: rebranding of the leading cybersecurity company

Estimated reading time: 3 minutes

Dear customers and partners, we are pleased to announce that our company is officially changing its name: from today Secure Online Desktop becomes Cyberfero!

In this article we will illustrate in detail all the news and reassurances related to this rebranding, which marks the evolution of our company.

What changes at a practical level

At a practical level, the change of name from Secure Online Desktop to Cyberfero does not entail any substantial changes for our customers.

The staff, as well as the services offered and their quality, remain unchanged. The company will continue to operate with the same seriousness and competence as always.

Access to services

Most of our services have already been migrated to the new cyberfero.com domain. Therefore, accessing the old secure-od.com domain, you will be automatically redirected to the new one.

We invite you to save the new addresses in your favorites for easier access. For services not yet transferred, they will continue to work regularly on the old domain until the migration is completed.

Billing

The next invoices will be issued with the new company name Cyberfero srl instead of Secure Online Desktop srl. Nothing changes for customers administratively.

What users need to do to continue using the services

Users absolutely do not have to do anything. The transition to the new name and domain will be completely automatic and transparent for users. The services will work exactly like before.

Why the name change

Secure Online Desktop, founded in 2011, was initially more focused on the provision of cloud computing services. Over the years the core business has shifted more and more towards cybersecurity services, which today represent the main activity.

We therefore decided to reflect this change also in the name, opting for Cyberfero.

Social Networks

Our social channels have been updated to reflect the name change, but will continue to be constantly updated to communicate all the news to followers.

The complete list of channels can be found in the site footer. We invite you to follow us to stay up to date on webinars, events and other news. Also register for the newsletter!

Curiosities about the new name

Cyberfero name
  • “Cyber” is an abbreviation for “Cyber Security” and refers to IT security.
  • “Fero” comes from the Latin “ferre” which means “to bring”.

So “Cyberfero” means “bringer of cyber security”, or “he who promotes and spreads IT security”.

Cyberfero shield

The logo depicts a shield, which evokes the concept of security through defense. But it also includes the idea of attack testing, to strengthen the shield itself.

Tell us what you think!

We are curious to know your impressions about this change. We invite you to share your opinions with us, both through our social channels and by writing to us at [email protected].

Your feedback is very valuable, it will help us better understand how the new Cyberfero name and identity was welcomed.

We look forward to hearing what you think!

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client February 21, 2025
    Posted by Qualys Security Advisory via Fulldisclosure on Feb 20Qualys Security Advisory CVE-2025-26465: MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client CVE-2025-26466: DoS attack against OpenSSH's client and server ======================================================================== Contents ======================================================================== Summary Background Experiments Results MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client DoS...
  • Self Stored XSS - acp2sev7.2.2 February 21, 2025
    Posted by Andrey Stoykov on Feb 20# Exploit Title: Self Stored XSS - acp2sev7.2.2 # Date: 02/2025 # Exploit Author: Andrey Stoykov # Version: 7.2.2 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2025/02/friday-fun-pentest-series-19-self.html Self Stored XSS #1: Steps to Reproduce: 1. Visit "http://192.168.58.168/acp2se/mul/muladmin.php" and login with "admin" / "adminpass" 2. In the field "Put the […]
  • Python's official documentation contains textbook example of insecure code (XSS) February 21, 2025
    Posted by Georgi Guninski on Feb 20Python's official documentation contains textbook example of insecure code (XSS) Date: 2025-02-18 Author: Georgi Guninski === form = cgi.FieldStorage() if "name" not in form or "addr" not in form: print("Error") print("Please fill in the name and addr fields.") return print("name:", form["name"].value) print("addr:",...
  • Re: Netgear Router Administrative Web Interface Lacks Transport Encryption By Default February 18, 2025
    Posted by Gynvael Coldwind on Feb 17Hi, This isn't really a problem a vendor can solve in firmware (apart from offering configuration via cloud, which has its own issues). Even if they would enable TLS/SSL by default, it would just give one a false sense of security, since: - the certificates would be invalid (public […]
  • Monero 18.3.4 zero-day DoS vulnerability has been dropped publicly on social network. February 16, 2025
    Posted by upper.underflow via Fulldisclosure on Feb 16Hello, About an hour ago, a group appearing to be named WyRCV2 posted a note on the nostr social network, which can be found at the following link: https://primal.net/e/note1vzh0mj9rcxax9cgcdapupyxeehjprd68gd9kk9wrv939m8knulrs4780x7 Save, share, use. The paste link includes a list of nodes that the attacker has instructed to target, along […]
  • Netgear Router Administrative Web Interface Lacks Transport Encryption By Default February 16, 2025
    Posted by Ryan Delaney via Fulldisclosure on Feb 16
  • [CVE-2024-54756] GZDoom <= 4.13.1 Arbitrary Code Execution via Malicious ZScript February 16, 2025
    Posted by Gabriel Valachi via Fulldisclosure on Feb 15In GZDoom 4.13.1 and below, there is a vulnerability involving array sizes in ZScript, the game engine&apos;s primary scripting language. It is possible to dynamically allocate an array of 1073741823 dwords, permitting access to the rest of the heap from the start of the array and causing […]
  • Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) February 16, 2025
    Posted by David Fifield on Feb 15Today at about 2025-02-13 19:00 I noticed the "≠" is back, but now the type 0x12 payload of the ?q query parameter gets formatted into the string representation of an IP address, rather than being copied almost verbatim into the page. If the payload length is 4 bytes, it […]
  • SEC Consult SA-20250211-0 :: Multiple vulnerabilities in Wattsense Bridge February 13, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 12SEC Consult Vulnerability Lab Security Advisory < 20250211-0 > ======================================================================= title: Multiple vulnerabilities product: Wattsense - Wattsense Bridge vulnerable version: Wattsense Bridge * Hardware Revision: WSG-EU-SC-14-00, 20230801 * Firmware Revision: Wattsense (Wattsense minimal)...
  • APPLE-SA-02-10-2025-2 iPadOS 17.7.5 February 11, 2025
    Posted by Apple Product Security via Fulldisclosure on Feb 10APPLE-SA-02-10-2025-2 iPadOS 17.7.5 iPadOS 17.7.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122173. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, […]

Customers

Newsletter

{subscription_form_1}