No Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…Read more
CVE-2021-44228 There is no impact due to the Log4j vulnerability on Brekeke products as all Brekeke products that have been released up till this time (December 2021) uses version 1.x. …Read more
FCC deadline for STIR/SHAKEN compliance for the small voice service provider is changed to June 30, 2021Read more
What is changing?
Apple announced that APNs will no longer support the legacy binary protocol as of March 31, 2021.Read more
This issue is observed when Standard Edition of Brekeke SIP Server is integrated with Responder 5 RGS (Responder Gateway Server).Read more
High CPU Usage Issue when Push Notification
Java versions 11.0.0 -11.0.7 are not recommended due to Java bug: JDK-8241054. We recommend to upgrade Java 11 to 11.0.8 or later.
No sound issue is found when Chrome v85 (currently beta) or later version is used with Brekeke PBX and WebRTC-based softphone.
This issue has been addressed with the updated version (v18.104.22.168), and this “no sound” issue has been resolved.
A critical vulnerability named Ghostcat was recently discovered that can allow hackers to take over unpatched systems. Responding to this report, we updated our version software to address the matter.Read more
California, where our office is located, ordered a statewide “shelter in place” to fight against the spread of Coronavirus infections.Read more
Software Release: v3.9 update (v3955) has been released!
Download the latest versionRead more