These updates are to address zero-day flaws that are being actively exploited. You need to get these Apple updates done Even if you (and your team) have automatic updates enabled – just check these Apple updates have been applied across all the impacted devices – both business owned devices and …
Why private needs to mean private
Public/Private Key encryption and security is one of the most powerful tools when it comes to building great cyber security – it is the security that the internet runs on. So when Microsoft reported a breach on a number of high profile Exchange Online mailboxes, no one expected that the …
It is getting to be a habit…
…to end the week with a malicious Android app: APT41 hackers target Android users with WyrmSpy, DragonEgg spyware (bleepingcomputer.com) If you need to know why you need to pay attention to these Android (and sometime Apple iOS) smartphone app cyber security threats, then read on here: Just Check – CyberAwake …
CISA adds Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) keeps an excellent database of software and firmware that it knows are being exploited in the wild. Adobe’s ColdFusion has been added to that database, the Known Exploited Vulnerabilities Catalog: CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA This …
Continue reading “CISA adds Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog”
Sophos impersonated
The trusted anti-virus and cyber security company Sophos is being impersonated by a threat actor, who have taken the name SophosEncrypt. Cybersecurity firm Sophos impersonated by new SophosEncrypt ransomware (bleepingcomputer.com) Their aim to get their ransomware onto your computers. Two takeaways from this: If the offer looks too good to …
