June 17th: Guide on Use of Attack Detection Systems +++ Patch Tuesday for Microsoft +++ Wi-Fi Tracking Leak Study +++ PACMAN is coming for Apple

Guide on Use of Attack Detection Systems

The German Federal Office for Information Security (BSI) has published a draft of a new orientation guide on the use of attack detection systems. The community draft provides guidance on requirements for critical infrastructure operators, as well as operators of energy facilities and energy supply networks and auditing bodies. Want to check it out? Find the link on our website.

Needless to say, but we will: If you want to dig deeper, here is our source material (German) for you to enjoy:

BSI veröffentlicht Community Draft zur Orientierungshilfe zum Einsatz von Systemen zur Angriffserkennung | bund.de

Patch Tuesday for Microsoft

Patch, Patch, Hooray! You might remember our news on the Zero Day Vulnerability in Microsoft Office – by now Microsoft claims to have fixed the topic with its June patch. Of course we know that our readers are always up to date with their updates. But in case you missed yours, go do it now!

Say what? You want to know more? Hey, you know where to go. Here’s our trusted sources:

Microsoft patches actively exploited Follina Windows zero-day | bleepingcomputer.com

Microsoft Patch Tuesday | theregister.com

Wi-Fi Tracking Leak Study

You might be tracked right now – thanks to your phone’s Wi-Fi probing function. While being a standard process in a phone’s communication with access points, the University of Hamburg found that this function might be leaking passwords in an experiment conducted back in November? Feel uncomfortable? Us, too.

Check out our main sources to find out more and keep track of the development and findings:

WiFi probing exposes smartphone users to tracking, info leaks | bleepingcomputer.com

https://arxiv.org/pdf/2206.03745.pdf

PACMAN is coming for Apple

A new hardware attack technique called PACMAN is keeping Apple busy. While it doesn’t seem to compromise the whole system, it is exploitative – yet the company doesn’t show fear of risk implications for Mac users. The question will be how this develops further and what that means for the future of the M1 chips in Apple hardware. Check our sources to get the deets:

PACMAN, a new attack technique against Apple M1 CPUs | Security Affairs

PACMAN | pacmanattack.com

“PACMAN” Hack Can Break Apple M1’s Last Line of Defense | IEEE Spectrum


Is cybersecurity a topic of interest for your company? As an independent entity with a portfolio of proven security providers, CyberCompare can provide you with comparative offers at no charge and with no obligation. Reach out to us or use our diagnostic to learn more about your cyber risk profile.

Please remember: this article is based our knowledge at the time it was written – but we learn more every day. Do you think important points are missing or do you see the topic from a different perspective? We would be happy to discuss current developments in greater detail with you and your company’s other experts and welcome your feedback and thoughts.

And one more thing: the fact that an article mentions (or does not mention) a provider does not represent a recommendation from CyberCompare. Recommendations always depend on the customer’s individual situation.