Cyber Security News Update – Week 27 of 2022

In this fast-paced world where things change overnight, ensuring cybersecurity is a rather challenging task. While adversaries are constantly looking for avenues to exfiltrate data and compromise systems, our goal is to ensure the security of our information systems. The following cyber news headlines aid in this process of understanding cybersecurity better and protecting our systems:

(more…)

Cisco Email Appliance Vulnerability causing Denial of Service

Technology conglomerate Cisco suffered a significant vulnerability. The latest Cisco vulnerability, discovered on June 6, 2022, allowed cybercriminals to crash the Cisco Secure Email appliances remotely via the usage of malicious email messages.

The Cisco high-profile vulnerability, the CVE-2022-20798, could allow cybercriminals to cut the affected device from management interfaces, rendering them unreachable and causing a DoS (Denial of Service). Let us look at the Cisco vulnerability that has caused a serious commotion.

(more…)

Unpatched DogWalk: A New Microsoft Zero-Day Vulnerability

Microsoft is an organization that provides services across the globe, with over 1.4 billion existing users. With many such users and a huge array of services being provided, there is a high chance of security issues. The zero-day vulnerability that cyber attackers nicknamed “DogWalk” has become an enormous concern for Microsoft as there is no official patch available for it yet, and the extent of compromise using the vulnerability is unclear. (more…)

A Summary of Forescout’s OT: ICEFALL Outlining 56 Vulnerabilities in Vendors Worldwide

Domain Squatting: What to do if Your Domain is Being Held Hostage

The Internet is a vast place. It is estimated that there are close to 2 billion websites online in 2022. Each of these websites has a unique hostname, or ‘domain’, that can be resolved into an IP address.

Whilst anyone can access these websites, one should note that some domains are more ‘valuable’ than others. Domains that include relevant keywords are more likely to show at the top of search engine results, directing more traffic to those sites. For example, a Google search for “how to make a voicemail” may direct you to websites with the word ‘voicemail’ in the domain name.

(more…)

UK Government Releases Free Tool to Check Email Security Risks

According to Paul Maddinson, NCSC director of national resilience and strategy, the new Email Security Check tool aims to assist users in discovering where they can do more to avoid spoofing and preserve privacy and provide practical advice on how to stay safe. Moreover, by implementing the recommended activities, organizations may strengthen their defenses, demonstrate that they are taking security seriously, and make life more difficult for cyber thieves.

(more…)

A Summary of Forescout’s OT: ICEFALL Outlining 56 Vulnerabilities in Vendors Worldwide

6 Tips to Effectively Deal With Returning Emails

Are you having issues with email bounce-backs and returning emails? You probably know just how annoying this can be. We all want to send out emails without having them returned.

Today, we will talk about returning emails to help you understand what causes them, how they work, and what you can do to prevent them. (more…)

Pin It on Pinterest