Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems. A major evolution of Apple Security Bounty, with the industry’s top awards for the most advanced research – Apple Security Research Your Takeaway This is …
End of support…
Software and hardware does have a use by date. Even though the equipment or software may still appear serviceable, if the vendor stops supplying updates, then the threat actors will start looking for vulnerable unsupported targets. Martin has written about this over on the Octagon Blog this month: Older versions …
What happens if you do not pay?
I have recently added a number of articles to my Ransomware Primer and as I am away on a project for a client, I thought for this week’s Wednesday Bit, I would point you at that primer: Your Takeaway The new to remind you how serious ransomware can be have …
Cyber Security Patching is Essential
This is far too many unpatched and vulnerable servers. Over 29,000 Exchange servers unpatched against high-severity flaw – BleepingComputer Computer Your Takeaway You might not have an Exchange server but managing and ensure all the cyber security patches needed to keep your organisation protected is a task that should not …
Do you have a Dell computer?
I do – but it is not impacted by this vulnerability: ReVault flaws let hackers bypass Windows login on Dell laptops – BleepingComputer The hack allows threat actors to bypass the regular Windows login and security – but they do need to physically located with the victim’s machine and have …
