Summary: As identified by Jisc, one of our trusted support partners a pair of vulnerabilities have been identified in PaperCut MF/NG print solutions. ZDI-CAN-18987 allows an attacker to bypass authentication on a vulnerable PaperCut Application… More »
Summary: Our Security Partner, Jisc is currently investigating multiple incidents of business email compromise (BEC) leading to financial fraud. These incidents are targeting both high-value and lower-level user accounts with particular focus on those linked… More »
In May 2022, 805 schools across the United Kingdom took part in the second nationwide audit of cybersecurity in schools. The Audit was run in partnership between the National Cyber Security Centre (NCSC, part of… More »
emPSN have completed the Rural Gigabit Connectivity, securing full fibre gigabit services to 126 schools in Lincolnshire, Derbyshire, Leicestershire and Rutland, and their communities. Our Project The project launched in May 2019, with the primary… More »
Summary: In late October 2022, reports emerged of an impending OpenSSL update for a critical vulnerability. On November 1, OpenSSL version 3.0.7 was released to address two high-severity buffer overflow vulnerabilities (CVE-2022-3602 and CVE-2022-3786) impacting… More »
What is a Cyber Attack? A Cyber Attack is the process of attempting to steal data or gaining unauthorised access to computers and networks to carry out a data breach. The goal of a cyber-attack… More »
Summary: On May 18, 2022, VMware disclosed two vulnerabilities (CVE-2022-22972 and CVE-2022-22973) in VMware Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. On the same day,… More »
Summary: As identified by Jisc, one of our trusted support partners a 0-day Remote Code Execution (RCE) vulnerability in Spring Core, a popular Java framework for building Java applications, has been identified. The RCE vulnerability… More »
What is a Cyber Attack? A Cyber Attack is any attempt to expose, alter, destroy, steal or gain unauthorised access to make unauthorised use of an asset. The incidents can be financially driven, taking advantage… More »