The threat actors do not stand still when it comes to cyber-attacks, they are constantly evolving new attack vectors as we start to understand and combat the current ones. Keeping up with these changes, especially when it comes to phishing emails – which is one of the most common ways …
Device Security (Pt. 2)
This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …
Cyber Security Updates
The US government’s Cybersecurity and Infrastructure Security Agency (CISA) is a key resource for us to keep up with the cyber security patches issued by the major – and sometimes more fringe – vendors. We especially pay attention in the week of Microsoft Patch Tuesday, as other vendors often issue …
Microsoft Patch Tuesday – March 2024
Today is the second Tuesday of the month that means our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. the team will keep an eye on the reports for the next day or two to …
White Hat Hackers
Here is some cyber security good news. Bugs in software found by the researchers before threat actors could exploit them: Google paid $10 million in bug bounty rewards last year (bleepingcomputer.com) Software is complicated and bug bounties paid by vendors is a good incentive for people to help them spot …
