Following yesterday’s post, more vulnerabilities have been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog.
Yesterday:
Twenty-one additions to the known exploited database! – Smart Thinking Solutions
Today:
CISA Adds 20 Known Exploited Vulnerabilities to Catalog | CISA
Microsoft, Apple and Cisco figure highly among the new additions but there are other products listed.
My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.
Clive Catton MSc (Cyber Security) – by-line and other articles