Showing posts from June, 2020

Do you have one of Vulnerable to the Top 8 Most Exploited Vulnerabilities?

The Most Exploited Vulnerabilities in 2016-2019 as Reported by the FBI. It probably won't surprise you that 7 of the 8 most exploited software vulnerabilities are to be found in Microsoft products. Their widespread use across organizations and institutions makes them an ideal candidate for cybercriminals. According to U.S. Government technical analysis, malicious cyber actors most often exploit vulnerabilities in Microsoft's Object Linking and Embedding (OLE) technology. OLE allows documents to contain embedded content from other applications such as spreadsheets. But also Adobe Flash Player makes it to the list. Older Unpatched Systems are Vulnerable for Cybersecurity Attacks   A recent report on the most exploited vulnerabilities by the Cybersecurity & Infrastructure Security Agency (CISA) and the FBI listed the most routinely exploited vulnerabilities in the wild. The interesting thing is that most of these vulnerabilities are pretty old, yet cyb

Four Big Reasons Companies Needing Document Management Today

Today companies face utmost global competition. Like new machines, materials and processes implementation, one has to constantly update documents to prove the operational excellence and help meet quality standards. Document Management software will help you do just that! It automates and manages document control processes, eliminates paper process and can greatly increase company-wide efficiency. •ISO Compliant Document Control System Document Management provides a comprehensive set of document control capabilities for organizing and managing all quality documents, such as Standard Operating Procedures (SOPs), policies and work instructions with complete version history along with CAPA procedures, non-conformance reports, forms and more in a centralized repository. A single, cohesive system for all documents makes the search for and the retrieval of documentation easier. It also ensures that only the current version of the document is

Emergency Patch Released for SMBv3 Vulnerability

    Emergency Patch Released for SMBv3 Vulnerability Microsoft released the KB4551762 security update to patch the RCE vulnerability found in Microsoft SMBv3 a couple of days after the flaw was disclosed as part of the March 2020 Patch Tuesday. The Windows SMBv3 Remote Code Execution vulnerability, tracked as CVE-2020-0796 and dubbed as SMBGhost, allows a remote and unauthenticated hacker to execute the arbitrary code on an exposed device. Microsoft stated that: "To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. To exploit the vulnerability against a client, an unauthenticated attacker would need to configure a malicious SMBv3 server and convince a user to connect to it." Microsoft originally planned to fix the flaw as part of its March 2020 Patch Tuesday update but pulled the plug at the last minute. Now the tech giant followed up with KB4551762 to fix the SMBGhost