News

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Norton LifeLock Identity Theft Protection Alert

Individuals who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system. They are aware of the problem and are [...]

Android Vulnerability Warning – Update Now

A vulnerability (CVE-2024-43093) has been discovered in Google Android that could allow for remote code execution.  Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context [...]

Cloud Storage: The Best Solution for Managing Business Data

It’s no secret that managing business data can be tricky. Sure, you can store information on separate hard drives. But is that the best strategy for your business?Let’s take a closer look at how cloud storage can benefit your operations. Cloud Storage: The Basics So, what exactly is cloud [...]

Organizing Your Cybersecurity Strategy into Left and Right of Boom

Navigating the fight for data security is ongoing and requires a dual strategy. To best protect IT assets, businesses need to equip themselves with an advanced collection of cybersecurity tactics. These tactics fall into two categories: proactive prevention (Left of Boom) and robust recovery (Right of Boom). Left of Boom [...]

5 Tips for Cybersecurity Awareness Month 2024

Every year, a crazy high number of people face the consequences of cyberattacks. These attacks not only cost organizations billions. They also leave a devastating impact on individuals.  We know, if you’re reading this, you get it. You already understand the importance of safeguarding your organization and people from cyber [...]

TikTok Links Exploited To Hijack Microsoft Accounts

TikTok might be the hottest social media platform in the world. Still, it’s spreading more than dance videos and questionable recipes. Hackers have found a way to use the site for their phishing campaigns, hiding malicious links in user bios to steal Microsoft 365 login credentials. The TikTok links [...]

By |2024-10-14T10:35:15-05:00October 14th, 2024|Categories: News|Tags: , , , , , , , , , , |

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion web browser users, the improved tool aimed to stop [...]

Microsoft Cracking Down On Security

Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and been worried about recent Microsoft attacks that are now [...]

Cybersecurity Advances and Their Critical Role in Protecting Business Assets

Your business is only as efficient as its technology, as safe and protected as its security measures, and as reputable as its actions. When keeping all these factors in line, you need the right cybersecurity practices to ensure your equipment, browsers, and employee ventures are not threatening your company, [...]

Go to Top