Android malware has already circumvented new OS security features

Android devices

Threat actors invest time and effort into beating security measures, especially when the targets are so profitable. Android users have proven to be lucrative targets: Malware devs already bypassed Android 13’s new security feature (bleepingcomputer.com) Make sure you have policies and procedures in place if your team are BYODing Android …

Cybersecurity and Infrastructure Security Agency exploited vulnerability advisory. How this type of mistake can impact your cyber security and steps to protect yourself.

code

The US Cybersecurity and Infrastructure Security Agency has added a new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA This is an interesting issue, as credentials had been hard coded into the application: “Atlassian Questions For Confluence App has hard-coded credentials, …

How secure is open source software? Do you use open source software or have software written for you? If so read on… UPDATED

software code

When we undertake any cyber security survey, and we ask about software, we know the greatest amount of work we will have to do, is when the client says “we had this written for us” or we use this “open source software”. (We will not get into Android apps or …