What was a little known communication and collaboration product before the COVID-19 pandemic, has now become common place both in business and the home. Everything from music concerts, birthday parties, quizzes, government briefings and business meeting – some confidential and some not – have been held on Zoom all over …
Twenty-one additions to the known exploited database!
It has been a busy couple of weeks for those threat actors and now the Cybersecurity and Infrastructure Security Agency (CISA) has caught up and added twenty-one known exploits this week – so far. CISA Adds 21 Known Exploited Vulnerabilities to Catalog | CISA Many mainstream products are in the …
Continue reading “Twenty-one additions to the known exploited database!”
Security Updates issued for multiple Firefox applications
CISA has issued an advisory about Firefox products. Mozilla Releases Security Products for Multiple Firefox Products | CISA
Our trust in public code – UPDATED 24 May 2022
The original post was made on 12 May 2022 Update 24 May 2022 Python is a popular coding language and many code libraries exist to make the programmer’s life a little easier. But as indicated in the articles below if that open source code becomes popular, then it also becomes …
Continue reading “Our trust in public code – UPDATED 24 May 2022”
Dangerous malware – it’s only function is to deceive you into clicking something…
Getting the word out to you, about the wide range of phishing emails and their associated social engineering tricks actually active in the wild, is one of the ain reasons this blog exists. Many of our clients use this blog as a resource as a link to the multitude of …
Continue reading “Dangerous malware – it’s only function is to deceive you into clicking something…”
