No Impact found with Log4j vulnerability + v3.12 Standard Release
No Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…
Read moreNo Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…
Read moreCVE-2021-44228 There is no impact due to the Log4j vulnerability on Brekeke products as all Brekeke products that have been released up till this time (December 2021) uses version 1.x. …
Read moreFCC deadline for STIR/SHAKEN compliance for the small voice service provider is changed to June 30, 2021
Read moreWhat is changing?
Apple announced that APNs will no longer support the legacy binary protocol as of March 31, 2021.
Read moreThis issue is observed when Standard Edition of Brekeke SIP Server is integrated with Responder 5 RGS (Responder Gateway Server).
Read moreHigh CPU Usage Issue when Push Notification
Java versions 11.0.0 -11.0.7 are not recommended due to Java bug: JDK-8241054. We recommend to upgrade Java 11 to 11.0.8 or later.
A critical vulnerability named Ghostcat was recently discovered that can allow hackers to take over unpatched systems. Responding to this report, we updated our version software to address the matter.
Read moreWe completed interoperability testing with another wholesale data/voice service provider: Virtual Global Phone (VGP). VGP is located in Hong Kong
Read moreWe have found a critical issue when our software is used in the following environment:
Products: Brekeke SIP Server v3.9.3.6 or earlier, Brekeke PBX v3.9.3.6 or earlier. Java: Version 9 or later version. Database: Embedded database