US Cybersecurity and Infrastructure Security Agency has issued advisories for various security updates: Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird | CISA
If there is way for threat actors to abuse legitimate tools, of course they do it! No, it is not deja vu!
The headline equally applies to the abuse of LinkedIn Smart Links: LinkedIn Smart Links abused in evasive email phishing attacks (bleepingcomputer.com) This is a feature in the LinkedIn Sales Navigator and Enterprise versions and allows packages of documents to be sent out and the metrics for the documents can be …
Do you have a policy to securely dispose of your redundant equipment?
Or do you let your staff or IT Support sell it on eBay? $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned | Ars Technica We do not resell equipment we are charged with disposing of securely.
If there is way for threat actors to abuse legitimate tools, of course they do it!
Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …
Be careful of security theatre and user security fatigue
Would your Global Administrator account security up to our standard? Protecting credentials is an important step in any cyber security plan. One of the first things we always do when taking on a cyber security client, before we even embark on the fact finding and documentation, is make sure everyone …
Continue reading “Be careful of security theatre and user security fatigue”
