Please take a moment to review these reference articles, evaluate your environments and patch accordingly. Be aware that several vulnerabilities addressed in this round of Patch Tuesday updates have potentially active exploits in the wild.
This situation is a great example of the importance of patch and firmware management. Just because a system is hosted in the cloud, it does not mean that you are not responsible for parts if not all of the patch and firmware oversight. Pay close attention to your service level agreements and other cloud services documentation.
If you are using these particular Azure services from Microsoft, please review this content and patch accordingly.
It’s that time again when we all get to evaluate our PC and server environments and kick off our monthly patching processes. Please take a look at the changes this month and patch accordingly. And please don’t forget your at-home devices. Patching is not just a business process. All computers and workstations and laptops need to be patched and updated on a regular basis.
Our ability to securely move beyond passwords as the singular trusted authentication mechanism has been here for some time, but concept and related technology has lacked traction. I am excited to see Microsoft continue to endorse and partner with the FIDO Alliance to bring forward secure, alternative authentication options to the masses.
Please remember that even the best Microsoft Hello option is still often a single authentication factor. For sensitive system access, multi-factor authentication is still the safest, most effective approach to authentication.
The Patch Tuesday cycle has begun once again and the team at Fortinet has announced some of the conditions surrounding several of the Windows and Office related patches that have been released by Microsoft. Please review your environments and patch your systems accordingly.
Kudos to Microsoft for fighting the good fight.
We face quite a bit of patching work this week. Microsoft has released numerous patches addressing multiple vulnerabilities including some fairly serious issues with DHCP. Cisco has released several patches including a specific patch addressing a “default password” vulnerability in CSPC – the platform collector for device management. Adobe has also released multiple patches across their application suites including some patches specific to Photoshop. To pile on a little more, WordPress has released patching in version 5.1.1 to address possible unauthenticated code execution flaws.
All of these updates and patches come on the heels of the recent Google Chrome update that so many had to address immediately due to “in the wild” exploits.
Please review your environments, including your third party applications and web server platforms, and patch accordingly.