Professional Services

Catch-IT: Multiple Vulnerabilities Discovered in Apple Products

Multiple vulnerabilities (CVE-2024-44308 and CVE-2024-44309) have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.  Depending on the privileges [...]

By |2024-11-21T15:35:45-05:00November 21st, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Norton LifeLock Identity Theft Protection Alert

Individuals who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system. They are aware of the problem and are [...]

Android Vulnerability Warning – Update Now

A vulnerability (CVE-2024-43093) has been discovered in Google Android that could allow for remote code execution.  Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context [...]

Cloud Storage: The Best Solution for Managing Business Data

It’s no secret that managing business data can be tricky. Sure, you can store information on separate hard drives. But is that the best strategy for your business?Let’s take a closer look at how cloud storage can benefit your operations. Cloud Storage: The Basics So, what exactly is cloud [...]

Organizing Your Cybersecurity Strategy into Left and Right of Boom

Navigating the fight for data security is ongoing and requires a dual strategy. To best protect IT assets, businesses need to equip themselves with an advanced collection of cybersecurity tactics. These tactics fall into two categories: proactive prevention (Left of Boom) and robust recovery (Right of Boom). Left of Boom [...]

5 Tips for Cybersecurity Awareness Month 2024

Every year, a crazy high number of people face the consequences of cyberattacks. These attacks not only cost organizations billions. They also leave a devastating impact on individuals.  We know, if you’re reading this, you get it. You already understand the importance of safeguarding your organization and people from cyber [...]

TikTok Links Exploited To Hijack Microsoft Accounts

TikTok might be the hottest social media platform in the world. Still, it’s spreading more than dance videos and questionable recipes. Hackers have found a way to use the site for their phishing campaigns, hiding malicious links in user bios to steal Microsoft 365 login credentials. The TikTok links [...]

By |2024-10-14T10:35:15-05:00October 14th, 2024|Categories: News|Tags: , , , , , , , , , , |

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion web browser users, the improved tool aimed to stop [...]

Microsoft Cracking Down On Security

Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and been worried about recent Microsoft attacks that are now [...]

Go to Top