What does Phishing Look like?
So I got this text the other day: Text from unknown number(spoofed anyway no need to put from number it is false – also I modified the link so others…
Another Vulnerability in a Cloud Framework
Rapid7 has found a spring framework vulnerability called Spring4Shell As usual a new vulnerability requires risk management to be reassessed. https://nvd.nist.gov/vuln/detail/CVE-2022-22965 Leads to https://tanzu.vmware.com/security/cve-2022-22965 Which says the following…
Linux Kernel Vulnerability + Dirty Pipe
What does it mean when a Linux Kernel has a vulnerability? the Linux kernel is the software which runs the system – the main operating system software it is inside…
Vulnerability Management – Just Do It!
Abilities Identify Security issues based on analysis of vulnerabilities – apply cybersecurity and privacy principles to organizational requirements Knowledge Application vulnerabilities, data backup and recovery, host/network access control mechanisms, system…
APC UPS (Power Supplies) 3 Critical Vulnerabilities
Do you have an APC UPS(Uninterruptible Power Supply)? (Image above from Armis Research) I do not know which devices actually have these vulnerabilities, assuming Armis research is correct then it…