The US government Cybersecurity and Infrastructure Security Agency (CISA) is one of our go to location for information about exploited vulnerabilities and patching – the type of resource I discuss in this week’s CyberAwake article: The Zero-day Threat – What can you do about it? Keeping up with these issues …
Routers and NAS Devices
Recently we covered the issues of hardware vulnerabilities and how network devices and other hardware are often missed when it comes to cyber security patching. Here are two more examples of why you should not miss the hardware… New Condi malware builds DDoS botnet out of TP-Link AX21 routers (bleepingcomputer.com) …
Apple patches everything
SANS has an excellent article looking at the Apple updates and what they apply to: Apple Patches Exploited Vulnerabilities in iOS/iPadOS, macOS, watchOS and Safari – SANS Internet Storm Centre Get them done.
The University of Manchester Hack
Some University of Manchester students and staff have been receiving emails, warning them that their personal information will soon be disclosed, because the University has not responded to the criminal’s demands. University of Manchester: Students and staff sent data leak threat – BBC News The students and staff number about …
The anatomy of a spear phishing attack
A spear phishing attack is a malicious email (usually) with content aimed to exploit the specific recipient. Yee Ching Tok, over on SANS Internet Storm has an excellent article taking apart a spear phishing email targeting YouTube content creators. Analyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators …
