Drupal is a CMS platform, similar to WordPress, so it is out there on the internet, vulnerable for exploitation. So if you use Drupal get it patched: Drupal Releases Security Advisory to Address Vulnerability in Drupal Core | CISA Do you know if your organisation’s website is hosted on Drupal …
US government Cybersecurity and Infrastructure Security Agency Advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) site in one of my “go to” places for information on vulnerabilities, exploitations and patches. Built for the US Government, and American centric, it is still a great resource. This week it has run an excellent article for security professionals on …
Continue reading “US government Cybersecurity and Infrastructure Security Agency Advisories”
CISA security advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) is a great resource for keeping up with the issues with software you may be using. They have highlighted issues with Fortinet and security updates for Cisco: Fortinet Releases March 2023 Vulnerability Advisories | CISA Cisco Releases Security Advisory for IOS …
CISA cyber security advisories and advice on MITRE ATT&CK
The US government Cybersecurity and Infrastructure Security Agency (CISA) added a vulnerability to its Known Exploited Vulnerabilities Catalog for ZK Framework: CISA Adds One Known Exploited Vulnerability to Catalog | CISA A updated version of the CISA Decider tool for the MITRE ATT&CK framework has been released. CISA Releases Decider …
Continue reading “CISA cyber security advisories and advice on MITRE ATT&CK”
CISA advises three exploited vulnerabilities
Although a US government agency the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog is a valuable resource for anyone responsible for cyber security. It reports on mainstream and less used software so that offbeat package you use could be reported on one day! They have released an …
Continue reading “CISA advises three exploited vulnerabilities”