Empowering victims: Why language matters in cybersecurity
Interpol has called to end the use of the phrase ‘pig butchering scams’. Why do words matter, and how can we use language to empower cybercrime victims?
Read MoreApple, Microsoft and Google: three of the biggest names in tech. And in October 2023 they appeared together in this Wired article – because they’ve all been busy patching some serious vulnerabilities.
So what did they fix? And how can organisations of all sizes improve their patch management systems?
At the end of October, Apple issued 12 new security fixes for its iOS 17.1. They included:
With more than 100 issues patched, Microsoft’s efforts have included zero-day vulnerabilities, among others:
The Chrome browser had 20 vulnerabilities patched, including one (the first on our list) that was rated as critical:
Some of the vulnerabilities here have already been exploited by attackers, while some haven’t yet been used in real-life attacks. They have varying degrees of severity, but all of them could be exploited – so users should update their devices and software as soon as possible to benefit from the security patching.
As well as Chrome, Google has patched a further 53 vulnerabilities on Android, some of them rated as critical – including a heap buffer overflow issue (CVE-2023-4863) that Malwarebytes noted could be used to install spyware.
Big tech companies are patching all the time – as highlighted by Microsoft’s well known monthly Patch Tuesday updates.
It’s the art of maintaining security. And there are some best practices for patch management that companies of all sizes can follow:
And come to Black Hat MEA to gain access to the latest insights and research in patch management, and connect with vendors and partners who can help you secure your organisation. We can’t wait to see you there
Join the newsletter to receive the latest updates in your inbox.
Interpol has called to end the use of the phrase ‘pig butchering scams’. Why do words matter, and how can we use language to empower cybercrime victims?
Read MoreHow GenAI could combat fake news, and why the problem of deception and truth goes beyond technology.
Read MoreLearn how an ethical hacker might work to evaluate your organisation’s IoT security with penetration testing.
Read More