On CISCO Zero-Day Vulnerabilities
“Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of Devices” https://thehackernews.com/2023/10/cisco-zero-day-exploited-to-implant.html
The report reads “An unauthenticated remote actor could exploit these vulnerabilities to take control of an affected system,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said. Specifically, these vulnerabilities allow the actor to create a privileged account that provides complete control over the device.”
Stiepan Aurélien Kovac Thanks for taking me to this alarming report.
Firstly let me introduce myself and our solutions to the audience who have no idea of what we are by directing their attention the to the joint press release by you and us — https://usnavyseals.einnews.com/pr_news/644965697/cyber-leaders-join-forces-to-protect-digital-identities-and-data-at-risk
Therein we announced a formal agreement to work together on important cybersecurity products. QRC will incorporate MIS’s Expanded Password System solutions into its own technology and QRC’s algorithms will be added to MIS’s high-security solutions to protect the digital identity of those who hold and handle the decryption keys for eAES®.
Secondly, I would like to refer them to a message that I have posted on the role that our solution plays for information assurance — “Identity Assurance for Information Assurance” (22Oct2023) https://www.linkedin.com/posts/hitoshikokumai_information-assuranceia-definition-explanation-activity-7121700293368578048-ZWBf
*This is Stiepan’s post — https://www.linkedin.com/posts/activity-7121483033613844480-JBne