BCyber SAโ€™s Post

View organization page for BCyber SA, graphic

837 followers

๐Ÿ”’ ๐’‘๐’‚๐’•๐’„๐’‰๐’Š๐’๐’ˆ ๐’Š๐’” ๐’‚ ๐’Œ๐’†๐’š ๐’Š๐’๐’•๐’ ๐’”๐’†๐’„๐’–๐’“๐’Š๐’•๐’š? Yes. And here's why. Recently a one-click vulnerability that had the potential to grant full control over user accounts on an AWS service was discovered. Like many other vulnerabilities, has a bigger and riskful impact on systems. This #FlowFixation vulnerability has been patched and systems are now classified as "secure" and "non-exploitable". Does it work for every architecture? Of course. โœ… the risk of patching, upon vulnerability disclosure, is close to zero. Meaning that a hour spent updating firmwares is a good and safe time spent. Each department should be always on top and spend some time trying catch up with sector news and official announcements. โŒ the risk of no-patching, upon vulnerability disclosure, is broadly close to maximum risk ever estimated. This means a threat actor could break in, harvest and/or exfiltrate data, lock every system, possibly demand for a ransom, cause a multimillion dollar loss, a supreme reputation downfall and a negative performace impact in the ecosystem. Always stay up to date, always take care of your systems. And if you're in need of some good practices on how to do that, we're happy to help. #beCyberBeSafe #BCyber #insec #cybersec #awareness #training

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics