Yesterday was the second Tuesday of the month, Microsoft Patch Tuesday. The day the cyber security world thinks about Microsoft patches and vulnerabilities. But remember other vendors also release cyber security and functionality updates and patches on or around the same time – check those as well. Our support team has …
Apple takes bug-hunting seriously!
Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems. A major evolution of Apple Security Bounty, with the industry’s top awards for the most advanced research – Apple Security Research Your Takeaway This is …
WordPress Vulnerability…
…another one. Earlier in the week, I pointed you at an article looking at how the popularity of Microsoft 365 makes it a target for threat actors. Well WordPress – the most popular CMS has the same issue. This time a theme has a vulnerability that allows the WordPress security …
Microsoft 365 – The Risks
Threat actors will always go after any vulnerabilities in popular products. Popular means more chance that some users somewhere will not have bothered to install the security patches. Do you use Microsoft 365 – we do, as do many of our clients. So perhaps it is time for you to …
They do get caught…
Threat actors and hackers do get caught: Teenagers charged over Transport for London cyber attack – BBC News I’ll not say anything else, I’ll let the article do that – the hackers need no more publicity. Your Takeaway If you do not have the basics of an incident response plan …
