CISA: Here’s how to apply this key Windows patch without breaking certificate authentication

CISA: Here’s how to apply this key Windows patch without breaking certificate authentication https://ift.tt/GREIFLH The Cybersecurity & Infrastructure Security Agency (CISA) is now advising federal agencies and others to patch a Windows flaw from Microsoft’s May Patch Tuesday.  CISA has re-added the Windows flaw CVE-2022-26925 to its Known Exploited Vulnerabilities (KEV) Catalog and has told […]

What is Network Performance Monitoring (NPM)?

What is Network Performance Monitoring (NPM)? https://ift.tt/GSkTftI Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosing, optimizing, and reporting on it. NPM aims to identify congestion, maximize throughput, and improve network performance for the user. It involves the management of each component of […]

Microsoft June 2022 Patch Tuesday: 55 fixes, remote code execution in abundance

Microsoft June 2022 Patch Tuesday: 55 fixes, remote code execution in abundance https://ift.tt/LYEHl5J Microsoft has released 55 security fixes that resolve critical issues including Remote Code Execution (RCE). The Redmond giant’s latest round of patches, usually released on the second Tuesday of each month in what is known as Patch Tuesday, includes fixes for problems such […]

Microsoft Office zero-day “Follina”—it’s not a bug, it’s a feature! (It’s a bug)

Microsoft Office zero-day “Follina”—it’s not a bug, it’s a feature! (It’s a bug) https://ift.tt/jr6YqRW Several researchers have come across a novel attack that circumvents Microsoft’s Protected View and anti-malware detection. The attack vector uses the Word remote template feature to retrieve an HTML file from a remote webserver. It goes on to use the ms-msdt […]

Backup is key for cyber recovery

Backup is key for cyber recovery https://ift.tt/hNyMO8u Granular and air-gapped backup are critical to data recovery, when, not if, a business falls victim to ransomware. Those are among the key takeaways from an Enterprise Strategy Group (ESG) study that surveyed information technology (IT) and cybersecurity professionals working within organizations across North America and Western Europe. […]