The flaw in the MOVEit file transfer software has caused a series of major cyber security breaches around the world – now there are patches for further issues: Progress Software Releases Service Pack for MOVEit Transfer Vulnerabilities | CISA You may not use MOVEit, but your takeaway from this is …
MOVEit secure file transfer compromised
A security advisory and advice has been issued by Progress for their popular secure file transfer software MOVEit. The flaw could give elevated privileges to threat actors to exfiltrate information that the client considers secure, without the client detecting the activity. Progress Software Releases Security Advisory for MOVEit Transfer | …
Snipping tool data leak fixed
Here is a follow-up to last week’s Microsoft Snipping Tool story about potential data leaks after an image was cropped – a patch! Microsoft pushes OOB security updates for Windows Snipping tool flaw (bleepingcomputer.com) The out-of-band (OOB) patch is available now – if you – or someone in your company …
Redacting – Microsoft fixes Snipping Tool
This is a follow up to yesterday’s redacting story: Microsoft is testing an update to the Snipping Tool – it is not here yet – so you need to take your own precautions to protect your information. Microsoft fixes Acropalypse privacy bug in Windows 11 Snipping Tool – BleepingComputer The …
Continue reading “Redacting – Microsoft fixes Snipping Tool”
When redacting does not work
This is not a repeat of the previous post – now the Microsoft Snipping Tool has been shown to have similar issues to Google Pixel’s image cropping tool – what you cut away is not lost and so secret, it can be recovered later. Windows 11 Snipping Tool privacy bug …
When redacting does not work
We all see redacting n the TV shows and movies we watch – documents with big black lines through the secret information that must not be revealed – and I use similar techniques for screenshots I use here to conceal secret information. I am sure you do the same. I …
As promised yesterday…
… more about extortion ransomware and what you can do about defending your information from it: From Encryption Ransomware To Extortion Ransomware Part I – CyberAwake This first part looks at defending critical accounts from compromise.