WEEKLY CYBERSECURITY NEWSLETTER NO: 206
#WeeklyCybersecurityTip: Know your threats and perform some threat modeling exercises!
Feb 21, 2022 12:14 pm
1- At last! Office macros from the internet to be blocked by default
Yesterday, we wrote that Microsoft had decided to turn off a handy software deployment feature, even though the company described itself as “thrilled” by the feature, and described its functionality as “popular”. #ICYMI, that was about the use of so-called App Bundles to make software available for...
Read More2- Best Practices For Kubernetes Container Security
Kubernetes or K8 is an open-source tool for automating, scaling, and maintaining deployments of container applications. Google founded Kubernetes after running a production workload for 15 years. Some features of Kubernetes are automated rollouts and rollbacks, storage orchestration, and secret mana…
Read More3- BlackByte Ransomware Breached US Critical Infrastructure
Ransomware threats have been on the rise with an update in several technologies. Many threat actor groups have been providing RaaS based ransomware services to cybercriminals. The Federal Bureau of Investigation (FBI) and the U.S. Secret Service (USSS) posted that as of November 2021, the BlackByte…
Read More4- Hackers targeting people with fake Track and Trace texts
Scan text messages claiming to be from NHS Test and Trace have been circulating recently, Cornwall council warns. The messages falsely claim that the recipient has been in close contact with someone that has tested positive for Covid and asks them to click on a link to book a test. The texts a…
Read More