Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird | CISA
The two sides of Google
On one side we have the alleged Google as villian. Google sign-up ‘fast track to surveillance’, consumer groups say – BBC News We all know that the primary Google business model is based on knowledge and use of our personal data, to promote the effectiveness of it’s advertising product to …
Knowledge of the current state of ransomware is an essential step in everyone’s cyber security plan
Various departments of the US Government have issued a joint advisory about MedusaLocker ransomware as part of their #stopransomware initiative. #StopRansomware: MedusaLocker | CISA Knowledge of circulating ransomware malware helps all organisations and individuals respond to the threats, when organisations that have been compromised, delay reporting the attacks or even …
The Most Dangerous Software Weaknesses
The 2022, list of the most dangerous software has been published at Common Weakness Enumeration (CWE): CWE – 2022 CWE Top 25 Most Dangerous Software Weaknesses (mitre.org) Who are CWE: Common Weakness Enumeration (CWEâ„¢) is a community-developed list of common software and hardware weakness types that have security ramifications. CWE …
Microsoft 365 timeouts to mitigate data leaks
Microsoft 365 administrators can now set a site wide timeout for users. This can be a benefit to mitigate data leakage from unmanaged machines left logged in. Microsoft 365 now prevents data leaks with new session timeouts (bleepingcomputer.com)
