Advisory

Beware of Fake CAPTCHA Malware Campaigns

A recently discovered fake CAPTCHA malware campaign sent to New Jersey State employees in an attempt to deliver the SectopRAT infostealer. The emails contain links directing targets to malicious or compromised websites and prompting deceptive CAPTCHA verification challenges. In the background, the visited website copies a command to the [...]

FBI Warning—Gmail, Outlook And VPN Users Need To Act Now

The Federal Bureau of Investigation has recently warned of weird ransomware attack threats delivered by the United States Postal Service, yes really, alongside a dangerous ransomware campaign from so-called Ghost attackers, and some of the most sophisticated threats against Gmail users ever. Having previously also advised users to use two-factor authentication to mitigate such [...]

Windows 10 Support Ending Soon – What are the Options?

On October 14, 2025, Microsoft will end support for Windows 10. When it reaches this "End of Life" (EOL) status, Microsoft will no longer provide free software updates, security fixes, or technical support for this version of Windows.  So, what are your options? Option 1. Continue Using Windows 10 (Not [...]

Teams and Windows 11 – Windows 10 EOL Series

Windows 11 and Microsoft Teams - New Features Your workday can be a little easier with the new Microsoft Teams in Windows 11.  Here's a more detailed look at some of the key new features: New Microsoft Teams client to be embedded into Windows 11 Teams will be embedded [...]

Windows 10 End of Life Series

Are you one of the 62+% still using Windows 10? This is for you! Microsoft has set October 14, 2025, as the official End of Life (EOL) date for Windows 10.  After this date, security updates will no longer be provided, and Microsoft will cease technical support for the operating [...]

FAQ – New Jersey Data Protection Act, Effective January 15, 2025

The New Jersey Data Protection Act (NJDPA), N.J. Stat. § 56:8-166.4 et seq., went into effect on January 15, 2025, as New Jersey joins eighteen other states with comprehensive data privacy laws.  Here’s what you need to know to stay compliant and maintain consumer trust. Who Is Affected? This law [...]

Meet the BMT IT Support Team!

It’s Our Incredible People Who Make a Difference in your IT Support! The BMT Support Team is comprised of industry experts who are passionate about their work, have an extensive background in a wide variety of applications, and are dedicated to helping you.  We know how frustrating it is [...]

Safety Tips for Online Holiday Shoppers!

 Tis the Season for Holiday Scammers!  3 Useful Tips When Shopping Online Holiday shopping is in full swing! We wanted to let you know about a few online shopping trends we've noticed and give some tips about how to stay safe online while buying gifts for everyone on your list!  [...]

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Norton LifeLock Identity Theft Protection Alert

Individuals who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system. They are aware of the problem and are [...]

Android Vulnerability Warning – Update Now

A vulnerability (CVE-2024-43093) has been discovered in Google Android that could allow for remote code execution.  Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context [...]

Go to Top