What’s New

Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S. The Czech Republic's Ministry of [...]

By |2024-05-06T09:04:12-05:00May 4th, 2024|Categories: BMT Announcement|

Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are [...]

By |2024-05-03T13:49:14-05:00May 3rd, 2024|Categories: BMT Announcement|

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to "facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker [...]

By |2024-05-03T13:48:27-05:00May 3rd, 2024|Categories: BMT Announcement|

Celebrate National Password Day!

It's World Password Day, Let's Celebrate! Not Christmas nor Halloween, at BMT the first Thursday of May marks the day of our favorite holiday – World Password Day! Let’s commemorate with three simple things you can do now to better protect yourself online. Use this link to take 20% off one [...]

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app's home directory. "The implications of this vulnerability pattern include arbitrary code execution and token theft, depending on [...]

By |2024-05-03T09:40:47-05:00May 2nd, 2024|Categories: BMT Announcement|

Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no [...]

By |2024-04-30T12:27:19-05:00April 30th, 2024|Categories: BMT Announcement|

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. "These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems," the Department [...]

By |2024-04-30T12:25:36-05:00April 30th, 2024|Categories: BMT Announcement|

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud security firm Infoblox described the threat actor as likely affiliated with [...]

By |2024-04-29T14:22:05-05:00April 29th, 2024|Categories: BMT Announcement|

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to [...]

By |2024-04-29T14:20:30-05:00April 29th, 2024|Categories: BMT Announcement|

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file ("signal-2023-12-20-160512.ppsx") [...]

By |2024-04-29T11:50:37-05:00April 27th, 2024|Categories: BMT Announcement|

Will a Pen Test Lower Your Cyber Insurance Premium?

According to Fitch Ratings, cyber insurance is the fastest-growing segment of the U.S. property/casualty insurance market. However, claims and payouts have jumped along with that growth, giving insurers a reason to be more exacting in what they expect from policyholders. The growth and sophistication of the cyber landscape have changed [...]

Go to Top