VMware Releases Security Updates

VMware has released security updates to address multiple vulnerabilities in VMware’s Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector, and vRealize Automation. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.  Therefore, Bhutan Computer Incident Response Team recommends users and administrators to review VMware Security Advisory VMSA-2022-0021 and apply the necessary updates....

Oracle Releases July 2022 Critical Patch Update

Oracle has released its Critical Patch Update for July 2022 to address 349 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.   Therefore, Bhutan Computer Incident Response Team recommends  users and administrators to review the Oracle July 2022 Critical Patch Update and apply the necessary updates.  ...

Drupal Releases Security Update 

Drupal has released security updates to address vulnerabilities affecting Drupal 9.3 and 9.4. An attacker could exploit some of these vulnerabilities to take control of an affected system.   Therefore, Bhutan Computer Incident Response Team recommends  users and administrators to review  Drupal security advisory SA-CORE-2022-015 and apply the necessary update.  ...

Google Releases Security Updates for Chrome

Google has released Chrome version 103.0.5060.134  for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.   Therefore, Bhutan Computer Incident Response Team recommends  users and administrators to review the Chrome Release Note and apply the necessary updates...

ITU-Bhutan Joint CyberDrill 2022

The four-days long ITU-Bhutan Joint CyberDrill was conducted  from 11-14 July, 2022. In the Day 1 session, participants learned about the cyber security trends within Bhutan, and global trends as well. A  high-level closed session was also conducted with participation from parliamentarians and high-level executives, where the importance of cybersecurity at all levels were discussed.  In the Day 2 session, participants learned how to set up an incident response team and how to handle incidents. It takes resources, well defined roles and responsibilities, among others things to manage and respond to cybersecurity incidents in an organization or nationally. The...