Software vulnerabilities, patches and updates are an important part of a “defence in depth” cyber security plan

US federal alert warns of the discovery of malicious cyber tools | US national security | The Guardian

I use the Cybersecurity and Infrastructure Security Agency, (CISA) a lot. Many of the blog posts I run here, start there. However there is a vast amount of information on the CISA and finding your way around and working out what applies to is time consuming.

Here is one from CISA for Microsoft:

Microsoft Releases Advisory to Address Critical Remote Code Execution Vulnerability (CVE-2022-26809) | CISA

TechRepublic have run an article highlighting the major vulnerabilities from the CISA site:

CISA adds 8 known security vulnerabilities as priorities to patch | TechRepublic

Have a look and check if you use any of these top 8 vulnerable packages. Now sure if you do then ask.

And do not forget Patch Tuesday – has everyone in your organisation run the updates yet? Not sure? Then Octagon can help with that – they have a monitoring system that will confirm when computers have been patched, giving you peace of mind.

Clive Catton MSc (Cyber Security) – by-line and other articles