Multi-factor authentication stands between you and a threat actor gaining access to your services – but the attackers have come up with a simple way to subvert it. Just keep bombarding you with authentication requests until you either give in or make a mistake. If the hacker has your correct …
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
Exploited Vulnerabilities
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added TP-Link, Apache and Oracle vulnerabilities to the Known Exploited Vulnerabilities Catalog. CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA
Vulnerabilities and Patches
The US government Cybersecurity and Infrastructure Security Agency (CISA) has issued a number of security advisories and added to its Known Exploited Vulnerabilities Catalog. This is one of my key sites for keeping our clients up to date with vulnerabilities and patches. Cyber Security Advisories Not all of this software …
CISA security advisories
The UK’s National Cyber Security Centre has joined with the US government Cybersecurity and Infrastructure Security Agency (CISA), FBI and US National Security Agency (NSA) to issue a security advisory about vulnerabilities in Cisco devices: APT28 Exploits Known Vulnerability To Carry Out Reconnaissance and Deploy Malware on Cisco Routers | …