BMT

Catch-IT: Multiple Vulnerabilities Discovered in Apple Products

Multiple vulnerabilities (CVE-2024-44308 and CVE-2024-44309) have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.  Depending on the privileges [...]

By |2024-11-21T15:35:45-05:00November 21st, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

TikTok Links Exploited To Hijack Microsoft Accounts

TikTok might be the hottest social media platform in the world. Still, it’s spreading more than dance videos and questionable recipes. Hackers have found a way to use the site for their phishing campaigns, hiding malicious links in user bios to steal Microsoft 365 login credentials. The TikTok links [...]

By |2024-10-14T10:35:15-05:00October 14th, 2024|Categories: News|Tags: , , , , , , , , , , |

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion web browser users, the improved tool aimed to stop [...]

Microsoft Cracking Down On Security

Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and been worried about recent Microsoft attacks that are now [...]

Cybersecurity Advances and Their Critical Role in Protecting Business Assets

Your business is only as efficient as its technology, as safe and protected as its security measures, and as reputable as its actions. When keeping all these factors in line, you need the right cybersecurity practices to ensure your equipment, browsers, and employee ventures are not threatening your company, [...]

Latest Trick – Malware Disguised as VPN

Suppose your employees use a VPN to access your company’s network when working remotely securely. In that case, you must know the latest threat targeting enterprises. Researchers have discovered that threat actors release malware disguised as VPN services, tricking users into downloading a malicious version of a well-respected VPN [...]

By |2024-09-19T13:01:03-05:00September 19th, 2024|Categories: News|Tags: , , , , , , , , , , |

WhatsApp for Windows Security Flaw

Suppose your company uses the popular messaging platform WhatsApp for Windows. In that case, you need to be aware of a potentially critical security flaw that puts your company at risk for a disruptive and costly breach. Users discovered the flaw in June 2024. It allows certain risky file [...]

By |2024-09-18T07:54:23-05:00September 18th, 2024|Categories: News|Tags: , , , , , , , , , , |

Protecting Your Google Workspace Account From Cyber Threats

If your company relies on Google Workspace, you must know about the latest cyber threat. As you know, setting up a new user account in Google Workspace requires email authentication. Hackers uncovered a vulnerability in Google’s protocols that bypassed this authentication process. The vulnerability allowed bad actors to create [...]

By |2024-09-16T11:38:32-05:00September 16th, 2024|Categories: News|Tags: , , , , , , , , , , |

Zoom Supports Calls with Up to One Million People

If you’ve ever been on a Zoom call and thought, “It would be great if more people could join in,” you’re in luck. The biggest name in video conferencing software just announced that event organizers can host up to one million attendees on a single-use webinar, significantly increasing from [...]

By |2024-09-13T09:03:54-05:00September 13th, 2024|Categories: News|Tags: , , , , , , , , , , |

Microsoft Apps on MacOS: Privacy Issues

Suppose you use Microsoft productivity apps like Microsoft Word for Mac. In that case, you need to know about a new report from cybersecurity researchers from Cisco Talos. According to the latest report, many of the most common Microsoft apps on MacOS have a significant vulnerability that could put [...]

What OpenAI SearchGPT Can Do for Your Business

Business owners worldwide depend on search engines to quickly get them the resources and answers they need. Google does a good job of delivering search results. Still, if you've got a complex or unusual query, this search engine behemoth sometimes drops the ball. If you want faster, more reliable [...]

By |2024-09-04T11:42:31-05:00September 4th, 2024|Categories: News|Tags: , , , , , , , , , , |
Go to Top