CISA Adds 36 Known Exploited Vulnerabilities to Catalog | CISA Updates to the Known Exploited Vulnerabilities Catalog include: Owl Labs QNAP Google Cisco Adobe Netgear Microsoft
How to unlock a Tesla that does not belong to you!
This is not a complete “how to steal the car”, but it does illustrate how, when tools are used for things they were not originally designed for, there can be unforeseen security issues as cyber criminals hunt for flaws, for example the internet for shopping and banking, and NFC and …
Continue reading “How to unlock a Tesla that does not belong to you!”
Let’s giveaway military secrets to win an argument with strangers whilst playing an online game! For real.
I am not going to say much about this – just, insider threat, and you cannot write a policy for idiots! Be careful who you trust. Leaking Military Secrets on Gaming Discussion Boards – Schneier on Security
Active exploit for Follina – the still unpatched flaw in Microsoft Word
Here is another excellent breakdown, with screen shots, of phishing emails exploiting the Microsoft Word/Follina/ms-msdt flaw. Being aware of the types of phishing emails the threat actors use is part of the defence in depth you need to have great cyber security. TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt) …
Continue reading “Active exploit for Follina – the still unpatched flaw in Microsoft Word”
New in the wild malware – SVCReady
Researchers at HP Wolf Security have started to see phishing spam email campaigns deploying a previously unknown malware family SVCReady. The HP security blog has a very good description of the malware and how it works – a bit techie – but towards the end it shows some images of …
