I have just published an article over on our online training site, CyberAwake, about how you start a cyber security review and then how paper becomes a significant step in that process: Where are the boundaries for your cyber security? – CyberAwake
Do you have a Samsung device?
Samsung suffered its second major data breach of 2022, but the details it is releasing are few and far between. There is some excuse about it being a holiday weekend or the data being of low value. Impact of Samsung’s most recent data breach unknown | TechRepublic I am sure …
Log4shell – the vulnerability that is inside many software packages – just ask VMware – is here to stay
The SolarWinds attack, where the threat actors got inside SolarWinds’ systems and added their malicious code to a legitimate software update, so having SolarWinds distribute this malware to many of its high and low profile customers around the world, seems a long time ago now. But at least in this …
CISA adds twelve vulnerabilities to the Known Exploited Vulnerabilities Catalog
These include products from Google, D-Link, QNAP, Apple, MicroTik, Oracle, Fortinet, Netgear and Android, with D-Link getting the most mentions. CISA Adds Twelve Known Exploited Vulnerabilities to Catalog  | CISA
You need to be aware of the support status of your Cisco equipment
Here is something new to add to your cyber security plan – the end-of-life of any Cisco equipment you have, as Cisco is no longer going to issue security patches for expired products: Cisco won’t fix authentication bypass zero-day in EoL routers (bleepingcomputer.com) You or your cyber security team need …
Continue reading “You need to be aware of the support status of your Cisco equipment”
