- Para hacer frente a la epidemia de coronavirus, se están generalizando el trabajo no presencial y el canal digital. En este escenario, muchos usuarios no habituados a trabajar en remoto tienen que adaptar sus hábitos de trabajo, incluyendo la aplicación de pautas de ciberseguridad.
Interesa la protección frente a ciberdelincuentes que puedan intentar realizar campañas de “phishing” en las que, haciéndose pasar por personal de la organización, en especial de atención a usuarios, pretendan obtener credenciales de acceso a los sistemas.
También interesan pautas o recomendaciones de protección que los usuarios pueden aplicar en el uso de sus ordenadores, dispositivos móviles, correo electrónico, redes sociales, almacenamiento en la nube, y cómo actuar en caso de un posible incidente.
Los siguientes recursos facilitan orientación ágil para usuarios:
Más información:
PAE - Portal administración electrónica (16/03/2020)
Intel processors vulnerability CVE-2019-14607 Security Advisory Security Advisory Description Improper conditions check in multiple Intel® Processors may allow an authenticated user to potentially ...
More info:
https://support.f5.com/csp/article/K29100014?utm_source=f5support&utm_medium=RSS
Project: Drupal coreVersion: 8.8.x-dev8.7.x-devDate: 2020-March-18Security risk: Moderately critical 13∕25 AC:Complex/A:User/CI:Some/II:Some/E:Proof/TD:DefaultVulnerability: Third-party libraryDescription: The Drupal project uses the third-party library CKEditor, which has released a security improvement that is needed to protect some Drupal configurations.Vulnerabilities are possible if Drupal is configured to use the WYSIWYG CKEditor for your site’s users. When multiple people
More info:
https://www.drupal.org/sa-core-2020-001
BlueZ and Intel Smart Sound Technology vulnerabilities CVE-2020-0556 and CVE-2020-0583 Security Advisory Security Advisory Description CVE-2020-0556 Improper access control in subsystem for BlueZ ...
More info:
https://support.f5.com/csp/article/K92327553?utm_source=f5support&utm_medium=RSS
https://wordpress.org/news/2020/03/wordpress-5-4-rc3/The third release candidate for WordPress 5.4 is now available! WordPress 5.4 is currently scheduled to be released on March 31 2020, and we need your help to get there—if you haven’t tried 5.4 yet, now is the time! There are two ways to test the WordPress 5.4 release candidate: Try the WordPress Beta Tester plugin (choose the “bleeding edge […]
More info:
https://wordpress.org/news/2020/03/wordpress-5-4-rc3/
https://wordpress.org/news/2020/03/wordpress-5-4-rc3/The third release candidate for WordPress 5.4 is now available! WordPress 5.4 is currently scheduled to be released on March 31 2020, and we need your help to get there—if you haven’t tried 5.4 yet, now is the time! There are two ways to test the WordPress 5.4 release candidate: Try the WordPress Beta Tester plugin (choose the “bleeding edge […]
More info:
https://wordpress.org/news/2020/03/wordpress-5-4-rc3/