No Impact found with Log4j vulnerability + v3.12 Standard Release
No Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…
Read moreNo Impact found with Log4j vulnerability. We want to assure our users that there is no impact on Brekeke products caused by the recently reported Log4j vulnerability…
Read moreCVE-2021-44228 There is no impact due to the Log4j vulnerability on Brekeke products as all Brekeke products that have been released up till this time (December 2021) uses version 1.x. …
Read moreFCC deadline for STIR/SHAKEN compliance for the small voice service provider is changed to June 30, 2021
Read moreWhat is changing?
Apple announced that APNs will no longer support the legacy binary protocol as of March 31, 2021.
Read moreThis issue is observed when Standard Edition of Brekeke SIP Server is integrated with Responder 5 RGS (Responder Gateway Server).
Read moreHigh CPU Usage Issue when Push Notification
Java versions 11.0.0 -11.0.7 are not recommended due to Java bug: JDK-8241054. We recommend to upgrade Java 11 to 11.0.8 or later.
No sound issue is found when Chrome v85 (currently beta) or later version is used with Brekeke PBX and WebRTC-based softphone.
This issue has been addressed with the updated version (v3.10.3.0), and this “no sound” issue has been resolved.
A critical vulnerability named Ghostcat was recently discovered that can allow hackers to take over unpatched systems. Responding to this report, we updated our version software to address the matter.
Read moreBack in 2018, we announced that our call center software, Brekeke CCS, supports Zoho CRM. We are happy to announce that now Brekeke PBX can also be connected with Zoho CRM.
Read more