We have written several articles recently about how critical patches and updates are to your cyber security. Here is another reason why: Proof-of-Concept released for critical Microsoft Word RCE bug (bleepingcomputer.com) Once the threat actors are aware of a vulnerability – whether it is patched or not – they will …
Emotet is back
Just when it looked like the Emotet spamming/malware operation had stopped, there are widespread reports that it has restarted. Emotet botnet starts blasting malware again after 5 month break (bleepingcomputer.com) Infected Microsoft Office documents are Emotet’s favoured method of malware distribution. Once the email has slipped past your technical defences, …
Advice from the National Cyber Security Centre and the UK Government – actions to take when the cybersecurity risk is high (Russia Ukraine Conflict) – UPDATED 2 May 2023
This post was originally made on 2 March 2022. It will be updated as the Russian Ukraine Conflict develops and will highlight the cyber security issues facing organisations and individuals at this time. The National Cyber Security Centre (NCSC) is advising all UK organisations to review and improve their cyber …
The Follina threat has not gone away just because Microsoft has issued a patch – Octagon has the solution
The threat actors are still attempting to exploit the Follina flaw in Microsoft Word – looking for those of you out there who have not bothered to run the updates: XFiles info-stealing malware adds support for Follina delivery (bleepingcomputer.com) Have you checked all the machines in your organisation have run …
If you are still catching up with Follina? Info from the Octagon support team.
The patches and fixes are out but Octagon’s support team is still getting enquiries about the Microsoft Follina flaw. Here is a blog post by Ben, one of the support team at Octagon, outlining what you need to know. And Smart Thinking’s article: