MSS News: Today's Daily Report

EXPLOIT Remote Command Exection via Shell Script

Starting to see this attack originating from 205.185.113[.]213 on several customers. We have sinkholed this IP on our offering.

EXPLOIT Netcore Router Backdoor Access

We have been observing these attacks from 104.244.76[.]219 which have been observed on nearly all of our customers. Our sensor will block this activity and prevent it from

The Jigsaw FirstWatch sensor is automatically configured to stop and block this type of activity so even if your devices are logging it, your routing devices are safe.


Contact: (800)447-2150 Ext. 1        To contact Jigsaw simply send a message in our chat window!

  • Facebook - Black Circle
  • Twitter - Black Circle

© 2017-2018 Jigsaw Security Enterprise Inc.

Jigsaw Security Enterprise Inc is a SDVOSB - Service Connected Disabled Veteran Owned Small Business Jigsaw Security is an operator of WIMAX networks and is operating under license WQVC235 as a common carrier, non-common carrier and private communications operator. Jigsaw Security operates cable and satellite services. Courses may be provided by a third party authorized training partner in some cases. Some training is only available for cleared and US Citizens. Courses approved by the North Carolina Department of Public Safety Private Protective Services Board for licensing and CE credits. JPM program insurance is provided by an authorized Jigsaw Security Insurance Partner and is not underwritten by Jigsaw Security. For insurance information please contact our JPM program manager. Jigsaw Security operates a network through our NCBroadband brand.