A combination attack that exploits the Log4j vulnerability and VMware to deliver ransomware

I have published a lot on the log4j and log4shell exploits and vulnerability. CISA issued a special warning about the long term impact of the issue: CISA advisory for continued exploitation of Log4Shell in VMware Horizon Systems – Smart Thinking Solutions Here is another real world example of the exploitation …

Cybersecurity and Infrastructure Security Agency exploited vulnerability advisory. How this type of mistake can impact your cyber security and steps to protect yourself.

code

The US Cybersecurity and Infrastructure Security Agency has added a new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA This is an interesting issue, as credentials had been hard coded into the application: “Atlassian Questions For Confluence App has hard-coded credentials, …

It takes only 15 minutes for the threat actors to start scanning for vulnerabilities when they are discovered. How quickly do you respond to gaps in your cybersecurity?

Social Engineering and Email Cyber Security Training

It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security. Hackers scan for vulnerabilities within 15 minutes of disclosure (bleepingcomputer.com) Here is a real world example of a …

Security patch round-up

Wired UK has an excellent article rounding-up the security updates across a range of products – our support team found it really useful – you might too. Apple Just Patched 39 iPhone Security Bugs—Update iOS ASAP | WIRED UK