News & Perspectives
At Excite Cyber, we have bought together three of the leading names in Australian technology services – VITCS, Brace168 and Excite IT to deliver comprehensive and tailored solutions that meet your business objectives.
As such, some blogs and perspectives may retain their prior branding.
![](https://excitecyber.com/wp-content/uploads/2023/07/Digital-Transformation-of-the-Public-Sector-1.jpg)
Top 7 Crucial Steps for Digital Transformation
Top 7 Crucial Steps for Digital Transformation Throughout the last couple of years we have witnessed changes in how traditional management, operations, and leadership roles
![](https://excitecyber.com/wp-content/uploads/2023/07/pexels-marta-branco-1194713.jpg)
Hacks – October 2022
September saw a significant number of cyber breaches with Uber, Rockstar Games and Optus all impacted within a week. The attack methods observed in these
![](https://excitecyber.com/wp-content/uploads/2023/07/fly-d-9PivUW7l1m4-unsplash.jpg)
Hacks – Authentication
Authentication is a prominent aspect of cyber security as it is end user facing and is generally the first step to access most systems. A
![](https://excitecyber.com/wp-content/uploads/2023/07/blockchain-2850276_1920-1080x675-1.jpg)
Who Has Access to your Company Data?
Whether you own a business, are an individual or are part of a Government sector, chances are you have faced the common challenge of keeping
![](https://excitecyber.com/wp-content/uploads/2023/07/freestocks-I_pOqP6kCOI-unsplash.jpg)
Hacks – May 2022 – Follina Zero Day Vulnerability
Tips and Tricks to mitigate and prevent “Follina”: References: https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug?hstc=1139630.416896d61b0745d0044e9a03af7f82ad.1653955273132.1653955273132.1653955273132.1&_ hssc=1139630.1.1653955273132&__hsfp=3244405923&hsutk=416896d61b0745d0044e9a03af7f82ad&contentType=listing-page https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e https://support.microsoft.com/en-us/office/preview-attachments-in-outlook-6f61e4ad-a93d-408c-bb3a-bc95107f66be https://threatpost.com/zero-day-follina-bug-lays-older-microsoft-office-versions-open-to-attack/179756/ https://www.reddit.com/r/msp/comments/v0tuvs/ms_office_vuln_polite_warning_about_nearterm/
![](https://excitecyber.com/wp-content/uploads/2023/07/clint-patterson-yGPxCYPS8H4-unsplash.jpg)
Hacks – Keep your Operating System safe
TIPS TO KEEP YOUR OPERATING SYSTEM SAFE Apple and Microsoft take great care in providing a safe and secure operating system for you to use
![](https://excitecyber.com/wp-content/uploads/2023/07/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash.jpg)
Encryption
Encryption may be a topic that you give passing attention to in response to security advisories but otherwise little else. Rather than providing a summary
![](https://excitecyber.com/wp-content/uploads/2023/07/encrpting-1024x1024-1.png)
Encryption
Cryptography involves turning plaintext into ciphertext (encryption) and then turning ciphertext into plaintext (decryption). Data encryption protects confidentiality and safeguards data integrity. A cryptographic system
![](https://excitecyber.com/wp-content/uploads/2023/07/markus-spiske-iar-afB0QQw-unsplash.jpg)
Common Vulnerabilities and Exposures
CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability Description: The exploit works by spraying an IIS server via several large GET HTTP requests and finishes with
![](https://excitecyber.com/wp-content/uploads/2023/07/temo-morales-cqmK2Ufazns-unsplash.jpg)
Common Vulnerabilities & Exposures June 2021
Vulnerability 1: D-Link Insufficient Credential Protection (7.2 High) Description: D-Link is affected by a credential exposure vulnerability. Credential exposure allows an attacker the ability to access credentials
![](https://excitecyber.com/wp-content/uploads/2023/07/pexels-pixabay-60504.jpg)
Common Vulnerabilities & Exposures May 2021
Vulnerability 1: UPDATED Microsoft Exchange Server RCE (9.8 Critical) Description: Microsoft Exchange Server has a new remote code execution vulnerability (RCE). These RCE’s enable an
![](https://excitecyber.com/wp-content/uploads/2023/07/pexels-sora-shimazaki-5935783.jpg)
Common Vulnerabilities & Exposures
Vulnerability 1: DotCMS Remote Code Execution Vulnerability (10.0 Critical) Description: A Remote Code Execution (RCE) vulnerability exists within DotCMS v5.2.3. An RCE attack involves an attacker