About Sue Juter

As Marketing Specialist at BMT, I am involved in the day-to-day marketing and sales support efforts. Excited to be part of team that is dedicated to providing exceptional technology solutions.

Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement

LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, "has engaged with law enforcement," authorities said. The development comes following the takedown of the prolific ransomware-as-a-service (RaaS) operation as part of a coordinated international operation codenamed Cronos. Over 14,000 [...]

By |2024-02-26T10:43:47-05:00February 25th, 2024|Categories: BMT Announcement|

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. "Microsoft will automatically enable the logs in customer accounts and increase the [...]

By |2024-02-26T10:41:15-05:00February 24th, 2024|Categories: BMT Announcement|

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messaging platform against future attacks arising from the threat of a practical quantum computer. "With compromise-resilient encryption and extensive defenses against even highly sophisticated quantum attacks, PQ3 is [...]

By |2024-02-22T13:49:30-05:00February 22nd, 2024|Categories: BMT Announcement|

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. "SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said. "The worm automatically searches through [...]

By |2024-02-22T13:45:56-05:00February 22nd, 2024|Categories: BMT Announcement|

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

How Businesses Can Safeguard Their Communication Channels Against Hackers

Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays, and overlaps. Externally, frustration-free customer communication is directly correlated to a positive customer experience and higher satisfaction. However, business communication channels are also a major target for [...]

By |2024-02-19T09:03:04-05:00February 17th, 2024|Categories: BMT Announcement|

Catch-IT: Multiple Vulnerabilities Found in Microsoft Products

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new [...]

By |2024-02-14T14:37:09-05:00February 14th, 2024|Categories: Catch IT, News|Tags: , , , , , , |
Go to Top