Guide on Use of Attack Detection Systems
The German Federal Office for Information Security (BSI) has published a draft of a new orientation guide on the use of attack detection systems. The community draft provides guidance on requirements for critical infrastructure operators, as well as operators of energy facilities and energy supply networks and auditing bodies. Want to check it out? Find the link on our website.
Needless to say, but we will: If you want to dig deeper, here is our source material (German) for you to enjoy:
Patch Tuesday for Microsoft
Patch, Patch, Hooray! You might remember our news on the Zero Day Vulnerability in Microsoft Office – by now Microsoft claims to have fixed the topic with its June patch. Of course we know that our readers are always up to date with their updates. But in case you missed yours, go do it now!
Say what? You want to know more? Hey, you know where to go. Here’s our trusted sources:
Wi-Fi Tracking Leak Study
You might be tracked right now – thanks to your phone’s Wi-Fi probing function. While being a standard process in a phone’s communication with access points, the University of Hamburg found that this function might be leaking passwords in an experiment conducted back in November? Feel uncomfortable? Us, too.
Check out our main sources to find out more and keep track of the development and findings:
PACMAN is coming for Apple
A new hardware attack technique called PACMAN is keeping Apple busy. While it doesn’t seem to compromise the whole system, it is exploitative – yet the company doesn’t show fear of risk implications for Mac users. The question will be how this develops further and what that means for the future of the M1 chips in Apple hardware. Check our sources to get the deets:
Is cybersecurity a topic of interest for your company? As an independent entity with a portfolio of proven security providers, CyberCompare can provide you with comparative offers at no charge and with no obligation. Reach out to us or use our diagnostic to learn more about your cyber risk profile.
Please remember: this article is based our knowledge at the time it was written – but we learn more every day. Do you think important points are missing or do you see the topic from a different perspective? We would be happy to discuss current developments in greater detail with you and your company’s other experts and welcome your feedback and thoughts.
And one more thing: the fact that an article mentions (or does not mention) a provider does not represent a recommendation from CyberCompare. Recommendations always depend on the customer’s individual situation.