![]() ![]() For OpenOffice, that would be 4.1.10 and later, and for LibreOffice, 7.0.5 or 7.1.1 and later. If you're using either of the open-source office suites, you're advised to upgrade to the latest available version immediately. The same flaw impacts LibreOffice, which is a fork of OpenOffice spawned from the main project over a decade ago, and for their project is tracked as CVE-2021-25635. ![]() BleepingComputer reports: The discovery of the flaw, which is tracked as CVE-2021-41832 for OpenOffice, was the work of four researchers at the Ruhr University Bochum. Although the severity of the flaw is classified as moderate, the implications could be dire. This gives you more time to patch technical vulnerabilities, while ensuring your human firewall remains secure.LibreOffice and OpenOffice have pushed updates to address a vulnerability that makes it possible for an attacker to manipulate documents to appear as signed by a trusted source. It self-evolves with employees’ security aptitudes, roles and learning styles to create personalized learning experiences that motivate everyone to care about security and change their behaviors. SecurityIQ by InfoSec Institute integrates security awareness training, phishing simulations and personalized learning in one platform. Enrolling your team in engaging security awareness training will keep them current on these threats and teach them the value of secure behavior. New security threats like Mailsploit emerge everyday. Enroll Your Workforce in Ongoing Security Awareness Training Always call or find another way to communicate sensitive information. As soon as information leaves your network, you lose control over how the data is used and shared. This was true before the discovery of Mailsploit and remains especially true now. ![]() Educate Your Workforce About the Dangers of Sharing Sensitive Information Via EmailĮmail should never include sensitive information. If you don’t know the sender or it’s unusual for the sender to contact you, find another way to contact the sender other than email. Ask Your Workforce to Verify Email Sender IdentityĪlways take time to evaluate emails you receive before replying. Want to learn more about phishing? Here’s an article on 10 Most Common Phishing Attacks! 2. It’s essential your security awareness training program covers email-based threats in detail and reinforces email use best practices. Many of these attacks are developed to circumvent technical controls, leaving it up to your team to spot and prevent hacking attempts. Mailsploit is not the first email-based security threat facing your workforce - everyday they receive phishing emails and malware from hackers trying to breach your systems. Teach Your Workforce Email Use Best Practices Here are four ways you can fight Mailsploit and other email-based threats with security awareness training: 1. Email users everywhere must assume no information sent via email is secure. In a post-Mailsploit world, it is now more important than ever to avoid sending sensitive and confidential information over email. It gets worse: According to Haddouche, emails sent using Mailsploit are virtually unstoppable at this point in time. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |