Security Updates from Microsoft

Microsoft has released security updates to address vulnerabilities in earlier version of multiple products. If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review portal.msrc.microsoft.com/en-us/security-guidance  for more details and apply necessary updates. Patch and be Protected.    ...

Security Updates for Chrome

Google has released Chrome version 61.0.3163.79 for  Mac, Windows, and Linux to address multiple vulnerabilities in earlier versions.If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review Chrome Releases  for more details and apply necessary updates. Patch and be Protected.  ...

Security Updates for Struts 2

The Apache  Software Foundation has released  Struts 2.5.13  to address a vulnerability in Struts 2. If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review Apache Security Bulletin   for more details and apply necessary updates. Patch and be Protected  ...

Security Updates for Thunderbird

Thunderbird 52.3 has been released by Mozilla to address multiple vulnerabilities in earlier .If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review  Thunderbird 52.3  for more details and apply necessary updates. Patch and be Protected  ...

Protection from Phishing

How to Protect from Phishing   Phishing is a technique deployed to solicit information from users through various means. The most popular are emails that uncanningly looks legitimate to unsuspecting users. Usually, the emails allure the users to click on a link that redirects to fraudulent websites that appears legitimate. Once the users are on the redirected website, they are asked to provide credentials such as usernames and passwords, that can potentially pose the users to risk for future compromises. Moreover, these fraudulent websites may contain malicious codes that can steal informations related to users from their browser’s cookies....