Cybersecurity and Infrastructure Security Agency exploited vulnerability advisory. How this type of mistake can impact your cyber security and steps to protect yourself.

code

The US Cybersecurity and Infrastructure Security Agency has added a new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA This is an interesting issue, as credentials had been hard coded into the application: “Atlassian Questions For Confluence App has hard-coded credentials, …

It takes only 15 minutes for the threat actors to start scanning for vulnerabilities when they are discovered.

hacked by social engineering

How quickly do you respond to gaps in your cybersecurity? It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security. Hackers scan for vulnerabilities within 15 minutes of …