Juniper Releases Security Advisory for Juniper Secure Analytics

  • Post author:
  • Post category:

Juniper released a security advisory to address multiple vulnerabilities affecting Juniper Secure Analytics. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the Juniper advisory JSA74298 and apply the necessary updates.

Continue ReadingJuniper Releases Security Advisory for Juniper Secure Analytics

CISA Releases The Mitigation Guide: Healthcare and Public Health (HPH) Sector

  • Post author:
  • Post category:

Today, CISA released the Mitigation Guide: Healthcare and Public Health (HPH) Sector as a supplemental companion to the HPH Cyber Risk Summary, published July 19, 2023. This guide provides defensive mitigation strategy recommendations and best practices to combat pervasive cyber threats affecting this critical infrastructure sector. It also identifies known vulnerabilities for organizations to assess

Continue ReadingCISA Releases The Mitigation Guide: Healthcare and Public Health (HPH) Sector

EDPB: guidelines to clarify the notion of “tracking” in the ePrivacy directive

  • Post author:
  • Post category:

Le 15 novembre 2023, le Comité européen de la protection des données (CEPD) a adopté des lignes directrices sur le champ d’application technique des dispositions sur le « traçage » de la Directive ePrivacy. Ces lignes directrices sont soumises à consultation pour une durée de six semaines.

Continue ReadingEDPB: guidelines to clarify the notion of “tracking” in the ePrivacy directive

The How, Where and What of Trade Mark registration for SMMEs in South Africa debunking common misconceptions – part 1

  • Post author:
  • Post category:

Introduction In today’s competitive business landscape, protecting your brand is essential for the success and longevity of your Small, Medium and Micro Enterprise (SMME). One of the most effective ways to safeguard your   brand identity is by applying for the registration of a trade mark. In this article, we will address common misconceptions surrounding the

Continue ReadingThe How, Where and What of Trade Mark registration for SMMEs in South Africa debunking common misconceptions – part 1

CISA Adds Three Known Exploited Vulnerabilities to Catalog

  • Post author:
  • Post category:

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-36584 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability CVE-2023-1671 Sophos Web Appliance Command Injection Vulnerability CVE-2023-2551 Oracle Fusion Middleware Unspecified Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks

Continue ReadingCISA Adds Three Known Exploited Vulnerabilities to Catalog