Disabling risky services for any OS or software “out-of-the-box” is always a good idea. If you need it, then you or your system administrators can enable it. A brute force attack is where a threat actor – or normally a threat actor computer – will try a range of different …
And it’s back – Microsoft reinstates, default blocking in Office apps of macros from the internet.
This story has gone back and forth. How can Microsoft wobble on what has been a well used attack vector, by threat actors for years and years? Microsoft to block downloaded Office macros – at last – Smart Thinking Solutions Oh No! Microsoft appears to have rolled back it’s macro …
Oh No! Microsoft appears to have rolled back it’s macro protection… UPDATED 12 July 2022
This post was originally published on 8 July 2022 Update 12 July 2022 Microsoft says that this rollback of “stopping macros from the web being blocked, out of the box” is only temporary and it points out that admins can still implement this restriction through Group policies: Macros from the …
The Follina threat has not gone away just because Microsoft has issued a patch – Octagon has the solution
The threat actors are still attempting to exploit the Follina flaw in Microsoft Word – looking for those of you out there who have not bothered to run the updates: XFiles info-stealing malware adds support for Follina delivery (bleepingcomputer.com) Have you checked all the machines in your organisation have run …
National Cyber Security Centre Threat Report 10 June 2022
The National Cyber Security Centre are back with their weekly threat report – having had a week off for the Queen’s Platinum Jubilee. Threat Report 10 June 2022 – NCSC.GOV.UK However it does not mention the latest information on the Microsoft Word / msdt.exe / Follina zero-day cyber security risk: