Practice Drinking Coffee* better known as Planning and Preparation

coffee

Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …

Ransomware is never far from the news

Threat actors have been taking advantage of an exploited set of Microsoft credentials to embed ransomware attacks into signed drivers: Microsoft-signed malicious Windows drivers used in ransomware attacks (bleepingcomputer.com) And LockBit got through the cyber security defences of California’s Department of Finance: LockBit claims attack on California’s Department of Finance …

CISA adds five vulnerabilities to the Known Exploited Vulnerabilities Catalog

This is another good resource from the US government Cybersecurity and Infrastructure Security Agency (CISA). Vulnerabilities for Fortinet, Citrix have been added but also for Microsoft Defender and Veeam Backup both of which are vital tools in the fight against threat actors: CISA Adds Five Known Exploited Vulnerabilities to Catalog …