Color logo - no background Piergiorgio Venuti

From Secure Online Desktop to Cyberfero: rebranding of the leading cybersecurity company

Estimated reading time: 3 minutes

Dear customers and partners, we are pleased to announce that our company is officially changing its name: from today Secure Online Desktop becomes Cyberfero!

In this article we will illustrate in detail all the news and reassurances related to this rebranding, which marks the evolution of our company.

What changes at a practical level

At a practical level, the change of name from Secure Online Desktop to Cyberfero does not entail any substantial changes for our customers.

The staff, as well as the services offered and their quality, remain unchanged. The company will continue to operate with the same seriousness and competence as always.

Access to services

Most of our services have already been migrated to the new cyberfero.com domain. Therefore, accessing the old secure-od.com domain, you will be automatically redirected to the new one.

We invite you to save the new addresses in your favorites for easier access. For services not yet transferred, they will continue to work regularly on the old domain until the migration is completed.

Billing

The next invoices will be issued with the new company name Cyberfero srl instead of Secure Online Desktop srl. Nothing changes for customers administratively.

What users need to do to continue using the services

Users absolutely do not have to do anything. The transition to the new name and domain will be completely automatic and transparent for users. The services will work exactly like before.

Why the name change

Secure Online Desktop, founded in 2011, was initially more focused on the provision of cloud computing services. Over the years the core business has shifted more and more towards cybersecurity services, which today represent the main activity.

We therefore decided to reflect this change also in the name, opting for Cyberfero.

Social Networks

Our social channels have been updated to reflect the name change, but will continue to be constantly updated to communicate all the news to followers.

The complete list of channels can be found in the site footer. We invite you to follow us to stay up to date on webinars, events and other news. Also register for the newsletter!

Curiosities about the new name

Cyberfero name
  • “Cyber” is an abbreviation for “Cyber Security” and refers to IT security.
  • “Fero” comes from the Latin “ferre” which means “to bring”.

So “Cyberfero” means “bringer of cyber security”, or “he who promotes and spreads IT security”.

Cyberfero shield

The logo depicts a shield, which evokes the concept of security through defense. But it also includes the idea of attack testing, to strengthen the shield itself.

Tell us what you think!

We are curious to know your impressions about this change. We invite you to share your opinions with us, both through our social channels and by writing to us at [email protected].

Your feedback is very valuable, it will help us better understand how the new Cyberfero name and identity was welcomed.

We look forward to hearing what you think!

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • User Enumeration in IServ Schoolserver Web Login September 11, 2025
    Posted by naphthalin via Fulldisclosure on Sep 10“I know where your children go to school.” The web front end of the IServ school server from IServ GmbH allows user enumeration. Responses during failed login attempts differ, depending on if the user account exists, does not exist and other conditions. While this does not pose a […]
  • Re: Apple’s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss September 11, 2025
    Posted by Matthew Fernandez on Sep 10Can you elaborate on why you consider this high severity? From the description, it sounds as if this behaviour is fail-closed. That is, the effects are limited to DoS, with security properties preserved.
  • Defense in depth -- the Microsoft way (part 92): more stupid blunders of Windows' File Explorer September 8, 2025
    Posted by Stefan Kanthak via Fulldisclosure on Sep 08Hi @ll, this extends the two previous posts titled Defense in depth -- the Microsoft way (part 90): "Digital Signature" property sheet missing without "Read Extended Attributes" access permission and Defense in depth -- the Microsoft way (part 91): yet another 30 year old bug of the […]
  • Critical Security Report – Remote Code Execution via Persistent Discord WebRTC Automation September 8, 2025
    Posted by Taylor Newsome on Sep 08Reporter: [Taylor Christian Newsome / SleepRaps () gmail com] Date: [8/21/2025] Target: Discord WebRTC / Voice Gateway API Severity: Critical 1. Executive Summary A proof-of-concept (PersistentRTC) demonstrates remote code execution (RCE) capability against Discord users. The PoC enables Arbitrary JavaScript execution in a victim’s browser context via WebRTC automation. […]
  • Submission of Critical Firmware Parameters – PCIe HCA Cards September 8, 2025
    Posted by Taylor Newsome on Sep 08*To:* support () mellanox com, networking-support () nvidia com *From:* Taylor Christian Newsome *Date:* August 20, 2025 *Dear Mellanox/NVIDIA Networking Support Team,* I am writing to formally submit the critical firmware parameters for Mellanox PCI Express Host Channel Adapter (HCA) cards, as detailed in the official documentation available here: […]
  • SEC Consult SA-20250908-0 :: NFC Card Vulnerability Exploitation Leading to Free Top-Up in KioSoft "Stored Value" Unattended Payment Solution (Mifare) September 8, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 08SEC Consult Vulnerability Lab Security Advisory < 20250908-0 > ======================================================================= title: NFC Card Vulnerability Exploitation Leading to Free Top-Up product: KioSoft "Stored Value" Unattended Payment Solution (Mifare) vulnerable version: Current firmware/hardware as of Q2/2025 fixed version: No version numbers available CVE number:...
  • FFmpeg 7.0+ Integer Overflow in FFmpeg cache: Protocol (CacheEntry::size) September 8, 2025
    Posted by Ron E on Sep 08An integer overflow vulnerability exists in the FFmpeg cache: URL protocol implementation. The CacheEntry structure uses a 32-bit signed integer to store cache entry sizes (int size), but the cache layer can accumulate cached data exceeding 2 GB. Once entry->size grows beyond INT_MAX and new data is appended, an […]
  • FFmpeg 7.0+ Integer Overflow in DSCP Option Handling of FFmpeg UDP Protocol September 8, 2025
    Posted by Ron E on Sep 08A vulnerability exists in the FFmpeg UDP protocol implementation ( libavformat/udp.c) where the dscp parameter is parsed from a URI and left-shifted without bounds checking. Supplying a maximum 32-bit signed integer (2147483647) triggers undefined behavior due to a left shift that exceeds the representable range of int. This results […]
  • FFmpeg 7.0+ Integer Overflow in UDP Protocol Handler (fifo_size option) September 8, 2025
    Posted by Ron E on Sep 08A signed integer overflow exists in FFmpeg’s udp.c implementation when parsing the fifo_size option from a user-supplied UDP URL. The overflow occurs during multiplication, which is used to compute the size of the circular receive buffer. This can result in undefined behavior, allocation failures, or potentially memory corruption depending […]
  • FFmpeg 7.0+ LADSPA Filter Arbitrary Shared Object Loading via Unsanitized Environment Variables September 8, 2025
    Posted by Ron E on Sep 08The ladspa audio filter implementation (libavfilter/af_ladspa.c) in FFmpeg allows unsanitized environment variables to influence dynamic library loading. Specifically, the filter uses getenv("LADSPA_PATH") and getenv("HOME") when resolving the plugin shared object (.so) name provided through the file option. These values are concatenated into a filesystem path and passed directly into […]

Customers

Newsletter

{subscription_form_1}