No Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…Read more
CVE-2021-44228 There is no impact due to the Log4j vulnerability on Brekeke products as all Brekeke products that have been released up till this time (December 2021) uses version 1.x. …Read more
FCC deadline for STIR/SHAKEN compliance for the small voice service provider is changed to June 30, 2021Read more
What is changing?
Apple announced that APNs will no longer support the legacy binary protocol as of March 31, 2021.Read more
This issue is observed when Standard Edition of Brekeke SIP Server is integrated with Responder 5 RGS (Responder Gateway Server).Read more
High CPU Usage Issue when Push Notification
Java versions 11.0.0 -11.0.7 are not recommended due to Java bug: JDK-8241054. We recommend to upgrade Java 11 to 11.0.8 or later.
A critical vulnerability named Ghostcat was recently discovered that can allow hackers to take over unpatched systems. Responding to this report, we updated our version software to address the matter.Read more
Software Release: v3.9 update (v3955) has been released!
Download the latest versionRead more
We completed interoperability testing with another wholesale data/voice service provider: Virtual Global Phone (VGP). VGP is located in Hong KongRead more
We have found a critical issue when our software is used in the following environment:
Products: Brekeke SIP Server v188.8.131.52 or earlier, Brekeke PBX v184.108.40.206 or earlier. Java: Version 9 or later version. Database: Embedded database