Have you noticed a significant increase in phishing messages over the past year? Have you noticed that these messages seem to be better crafted, harder to identify, and generally very sneaky? The stats from the team at KnowBe4 bear out the truth that most of us have been living over the last couple of years.
This significant increase in well crafted phishing messages should be a strong motivator to increase awareness training for our end users.
I continue to see more and more of these scare tactic emails arriving in the mailboxes of friends, customers, and colleagues. These are, admittedly often well crafted messages designed to play on the darkest fears of humanity and they utilize some very basic techniques to build a sense of legitimacy.
This article provides a good overview of the attack/phish and hopefully will ease some concerns.
We face quite a bit of patching work this week. Microsoft has released numerous patches addressing multiple vulnerabilities including some fairly serious issues with DHCP. Cisco has released several patches including a specific patch addressing a “default password” vulnerability in CSPC – the platform collector for device management. Adobe has also released multiple patches across their application suites including some patches specific to Photoshop. To pile on a little more, WordPress has released patching in version 5.1.1 to address possible unauthenticated code execution flaws.
All of these updates and patches come on the heels of the recent Google Chrome update that so many had to address immediately due to “in the wild” exploits.
Please review your environments, including your third party applications and web server platforms, and patch accordingly.
We all tend to get caught up in patching and updating our Windows environments and, when time permits, tackling the 3rd party patch needs that come with Adobe, Java and other add-on applications. Don’t lose sight of your network infrastructure and the firmware that powers your network backplanes and critical edge devices. Please review your environments and update your Cisco devices accordingly.
I particularly like the title from the linked article from “The Register” – “Put down the cat, coffee, beer pint, martini, whatever you’re holding, and make sure you’ve updated Chrome (unless you enjoy being hacked)” . It is imperative that we all patch these types of zero day vulnerabilities, especially once they are active in the wild. Review and patch accordingly!