Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …
Windows 11 automation tools open to abuse
Automating tasks on a computer used to be hard, but today it is very easy with a range of drag and drop tools available. Obviously the Power Automate included into Microsoft’s Windows 11 will be among the most popular – I know I use it. Now researchers at Zenity have …
Continue reading “Windows 11 automation tools open to abuse”
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The vulnerabilities apply to SAP, Apple, Google, Palo Alto and Microsoft products. CISA Adds Seven Known Exploited Vulnerabilities to Catalog | CISA
Microsoft takes action to disrupt ongoing persistent phishing and credential theft campaigns
Microsoft’s Threat Intelligence Centre (MSTIC) has shared an article outlining how the actions they have undertaken to disrupt the Russian threat actor, SEABORGIUM, phishing and credential theft campaigns. Disrupting SEABORGIUM’s ongoing phishing operations – Microsoft Security Blog
Bug Bounties – a good way to improve your cyber security
Offering money to ethical technologists, who spot flaws in your software and tell you first before the hackers spot it, is an excellent way to keep your software secure. Microsoft reveals bug bounty payouts • The Register