tech interest

Catch-IT: Multiple Vulnerabilities Discovered in Apple Products

Multiple vulnerabilities (CVE-2024-44308 and CVE-2024-44309) have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.  Depending on the privileges [...]

By |2024-11-21T15:35:45-05:00November 21st, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

New Chrome Threat: Make Sure Your Browser is Up to Date

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel. The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the [...]

By |2024-05-10T13:01:08-05:00May 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Patches Issued for Microsoft Products

April’s Patch Tuesday was a record-breaker for Microsoft, with the software giant releasing patches for 147 vulnerabilities — more than researchers can recall ever seeing previously in a single month.  This month’s list initially appeared to contain no zero-day vulnerabilities, but researchers were quick to correct this — pointing [...]

By |2024-04-10T11:28:37-05:00April 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Top Ransomware Trends – Q1 2024

For the first quarter of 2024, ransomware incidents reported to the NJCCIC consisted of Akira, LockBit, and Play ransomware. There was a sharp increase in Akira ransomware attacks, particularly after the LockBit ransomware group’s takedown. Akira ransomware operators are known for their sophisticated attacks, especially against US healthcare organizations. [...]

By |2024-04-05T08:23:19-05:00April 4th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Multiple Vulnerabilities Found in Apple Products

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation in the context of the logged on user. Depending on the privileges associated with the user, an [...]

By |2024-03-06T11:23:32-05:00March 6th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

Catch-IT: Multiple Vulnerabilities Found in Microsoft Products

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new [...]

By |2024-02-14T14:37:09-05:00February 14th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

The Award for 2023 Most Impersonated Brand Goes to….

Microsoft! Phishing continues to lead the pack when it comes to online threats, with the FBI reporting more than 300,000 attacks last year alone. How are these attacks still so successful, despite better security tools and an increase in security awareness training? This is partially a result of cybercriminals knowing what may prompt [...]

Beware of the ‘Say Yes’ phone scam

What is the 'Say Yes' phone scam? The "Say Yes" phone scam is a type of fraud where a person receives a call from an unknown number. If they answer it, the robocaller on the other end of the line will ask a question that prompts the victim to say "yes." [...]

10 Signs Your Computer Has a Virus

Like the real thing, computer viruses replicate themselves, spreading through your operating system and network. At the same time, the virus is wreaking havoc: it can damage programs, delete files, and make devastating changes to your hard drive, all of which can result in reduced performance. Some viruses will even crash [...]

Free Tools for Cybersecurity Awareness Month

October is a great month for many reasons, but at BMT we especially like this time of the year as it celebrates something that should be an important part of any business culture, cybersecurity awareness.  While usually an afterthought until it happens, cyberattacks are increasing at a significant pace.  [...]

Go to Top