Month: April 2024

MS-ISAC ADVISORY NUMBER: 2024-035 DATE(S) ISSUED: 04/09/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or…

Read More

Apply the stable channel update provided by Adobe to vulnerable systems immediately after appropriate testing. (M1051: Update Software)o Safeguard 7.1 : Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.o…

Read More

In both cases, these actions will create “FileDownloaded” entries in the SharePoint audit log so any security solution that monitors those can potentially detect suspicious behavior, like an unusually large number of files being downloaded over a short time, or from a new device or from a new location. “As part of our research, we…

Read More

If only Patch Tuesdays came around infrequently — like total solar eclipse rare — instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to eclipse the number of vulnerabilities fixed in this month’s patch batch — a record 147…

Read More

Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.   Users and administrators are encouraged to review the following and apply the necessary updates:   Source link lol

Read More

Adobe has released security updates to address multiple vulnerabilities in Adobe software. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. Users and administrators are encouraged to review the following Adobe Security Bulletins and apply the necessary updates:   Source link lol

Read More

It’s no secret the internet doesn’t always bring out the best in people. The relative anonymity and global sprawl of digital life make it the ideal environment for scams, trolling and other kinds of bad behavior online.  I host a podcast about cybersecurity, and was pondering how to put the issues we all face in…

Read More

Fortinet released security updates to address vulnerabilities in multiple products, including OS and FortiProxy. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the following advisories and apply necessary updates:  FR-IR-23-345 FortiClientMac – Lack of configuration file validation FG-IR-23-493 FortiOS…

Read More

No one’s too smart for a well-designed scam. Case in point, neuroscientist, triathlete Carina who thought the finance bro she met on Bumble was the one for her, but the only real thing was the money she lost.  This week’s Tin Foil Swan dives into the sunk cost fallacy and the role it plays in…

Read More

Fortinet released security updates to address vulnerabilities in multiple products, including OS and FortiProxy. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the following advisories and apply necessary updates:    FR-IR-23-345 FortiClientMac – Lack of configuration file validation FG-IR-23-493…

Read More