Technology conglomerate Cisco suffered a significant vulnerability. The latest Cisco vulnerability, discovered on June 6, 2022, allowed cybercriminals to crash the Cisco Secure Email appliances remotely via the usage of malicious email messages.
The Cisco high-profilevulnerability, the CVE-2022-20798, could allow cybercriminals to cut the affected device from management interfaces, rendering them unreachable and causing a DoS (Denial of Service). Let us look at the Cisco vulnerability that has caused a serious commotion.
Microsoft is an organization that provides services across the globe, with over 1.4 billion existing users. With many such users and a huge array of services being provided, there is a high chance of security issues. The zero-day vulnerability that cyber attackers nicknamed “DogWalk” has become an enormous concern for Microsoft as there is no official patch available for it yet, and the extent of compromise using the vulnerability is unclear. (more…)
Cyberattacks are a constant problem but can be tackled with the right cybersecurity measures. This week’s news headlines feature one such incident, reemphasizing the significance of being vigilant online.
The Internet is a vast place. It is estimated that there areclose to 2 billion websites online in 2022. Each of these websites has a unique hostname, or ‘domain’, that can be resolved into an IP address.
Whilst anyone can access these websites, one should note that some domains are more ‘valuable’ than others. Domains that include relevant keywords are more likely to show at the top of search engine results, directing more traffic to those sites. For example, a Google search for “how to make a voicemail” may direct you to websites with the word ‘voicemail’ in the domain name.
There is a critical issue with Atlassian in the form of a remote execution code, a vulnerability that is impacting the Confluence Server and Data Center. The flaw, referred to as the CVE-2022-26134, was first discovered by Australia’s Volexity.
Since cyberattacks are a challenge we are constantly battling against, it is important to be updated with the latest cybersecurity recommendations and patches released by organizations worldwide. The following are this week’s most significant cyber news headlines:
Microsoft recently discovered high-severity vulnerabilities in a mobile framework owned by mce Systems and used by several large mobile service providers. These vulnerabilities are likely to be attack vectors for attackers to access system configurations and sensitive information.
This week’s cybersecurity headlines highlight that ransomware actors are constantly evolving, and the shutting down of a few ransomware groups is certainly not an indicator of their overall submersion. To bring more clarity to this, here are the major cybersecurity headlines: (more…)
Cyber adversaries are constantly looking for vulnerabilities in security systems. As such, adopting cybersecurity measures is vital for keeping our organizations’ information assets secure. The following are this week’s major headlines to help you plan your security moves better:
According to Paul Maddinson, NCSC director of national resilience and strategy, the new Email Security Check tool aims to assist users in discovering where they can do more to avoid spoofing and preserve privacy and provide practical advice on how to stay safe. Moreover, by implementing the recommended activities, organizations may strengthen their defenses, demonstrate that they are taking security seriously, and make life more difficult for cyber thieves.