Software and hardware does have a use by date. Even though the equipment or software may still appear serviceable, if the vendor stops supplying updates, then the threat actors will start looking for vulnerable unsupported targets. Martin has written about this over on the Octagon Blog this month: Older versions …
Something for the holidays
The holiday season is drawing to a close, but this scam that Bruce Schneier writes about will work at any time of the year. Baggage Tag Scam – Schneier on Security Your Takeaway This type of cyber-attack involving something that you should keep private, but you let get into the …
The Out-Of-Office Email and How It Compromises Your Organisation’s Cyber Security
I am in the process of writing our new course at the moment – more details in our newsletter – so for the Wednesday Bit this week I have an article about the out-of-office email, first published on CyberAwake. I chose this article as I have been discussing with several …
Microsoft Office under attack… again…
So most organisations use Microsoft Office in some way. Even if it they do not use it, someone will email them a Word or Excel document. You cannot avoid it – even on a Mac or Linux computer. That makes it a juicy target for threat actors – there are …
Continue reading “Microsoft Office under attack… again…”
US government Cybersecurity and Infrastructure Security Agency Advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) site in one of my “go to” places for information on vulnerabilities, exploitations and patches. Built for the US Government, and American centric, it is still a great resource. This week it has run an excellent article for security professionals on …
Continue reading “US government Cybersecurity and Infrastructure Security Agency Advisories”
