Nextcloud News

What is going on in and around Nextcloud?

Urgent security issue in NGINX/php-fpm

Dear system administrators, In the last 24 hours, a new security risk has emerged around NGINX, documented in CVE-2019-11043. This exploit allows for remote code execution on some NGINX and php-fpm configurations. If you do not run NGINX, this exploit does not effect you. Unfortunately the default Nextcloud NGINX configuration … Continued

Nextcloud 17 scales up and improves data protection with Remote Wipe, collaborative text editor, 2FA updates, IBM Spectrum Scale support and Global Scale improvements

Fresh from the Nextcloud conference stage, we are proud to announce a major release of Nextcloud, the easiest solution for secure, on-premises collaboration on documents, calendars and communication! Nextcloud 17 will introduce a series of secure collaboration features including a collaborative text editor, remote wipe, updated secure view, improved two-factor-authentication … Continued

Nextcloud and HackerOne publish case study

HackerOne, the global hacker-powered security leader, announced results from private cloud-based solution provider Nextcloud’s bug bounty program. Industry-leading on-premises file sync and collaboration Nextcloud provides industry-leading on-premises file sync and online collaboration technology to customers all over the world. Security is not just a priority, it’s a core component of … Continued

Nextcloud 13 Brings Improved UI, Video and Text Chat, End-to-end Encryption, Improved performance and more

Nextcloud 13 is out after 9 months of development and testing. This release brings improvements to the core File Sync and Share like easier moving of files and a tech preview of our end-to-end encryption for the ultimate protection of your data. It also introduces collaboration and communication capabilities, like … Continued

Encryption in Nextcloud

Providing strong protection of data is the biggest benefit Nextcloud has over public clouds. Self-hosting means you are in control over your data. Of course, un-authorized access has to be stopped and this is where encryption comes in. In this blog post we’ll discuss the different types and layers of … Continued

Subscribe to our newsletter

Want to be sure to never miss anything? Subscribe to our newsletter!

Vous avez désactivé javascript. Nous essayons de faire en sorte que les bases de notre site web fonctionnent, mais certaines fonctionnalités seront manquantes.

Ce site Web utilise des cookies. En visitant notre site, vous acceptez notre politique de confidentialité. J'accepte