If we did not use passwords, then the world would probably be a more secure place. Why? Read on: Something better than a password – Passwordless Authentication – CyberAwake
Practice Drinking Coffee* better known as Planning and Preparation
Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning and Preparation = Good Governance Businesses and organisations need a cyber security policy and a plan covering what they do to mitigate the risk of an incident and what they …
Continue reading “Practice Drinking Coffee* better known as Planning and Preparation”
CISA adds a software development tool vulnerability to the Known Exploited Vulnerabilities Catalog and security advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability for Telerik, a software development tool, to it’s Known Exploited Vulnerabilities Catalog: CISA Has Added One Known Exploited Vulnerability to Catalog | CISA This week CISA also released a security advisory for a range of Apple products, …
Do you know what an Excel XLL file is? The hackers do.
An Excel XLL file is a an add-in file that allows third parties to add extra functionality to Microsoft Excel – pretty useful. But of course the threat actors have extended that third party functionality to include malware. Now, just like with macros, Microsoft is blocking XLL files, originating from …
Continue reading “Do you know what an Excel XLL file is? The hackers do.”
Close one door and another opens
I had an article published yesterday discussing the risks still posed by the Microsoft Office macro, even though Microsoft has tightened the security when using them: Microsoft Office Macros Are Still an Issue – CyberAwake But the threat actors do not stop there. Closing the macro attack vector sent the …
