susan.juter@bmtcorp.com

About Sue Juter

As Marketing Specialist at BMT, I am involved in the day-to-day marketing and sales support efforts. Excited to be part of team that is dedicated to providing exceptional technology solutions.

Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks

Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and large language models (LLMs) to complement their ongoing cyber attack operations. The findings come from a report published by Microsoft in collaboration with OpenAI, both of which said they disrupted efforts made [...]

By |2024-02-14T13:56:47-05:00February 14th, 2024|Categories: BMT Announcement|

Ubuntu ‘command-not-found’ Tool Could Trick Users into Installing Rogue Packages

Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems running Ubuntu operating system. "While 'command-not-found' serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by [...]

By |2024-02-14T13:54:49-05:00February 14th, 2024|Categories: BMT Announcement|

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. "This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence [...]

By |2024-02-13T14:04:09-05:00February 13th, 2024|Categories: BMT Announcement|

4 Ways Hackers use Social Engineering to Bypass MFA

When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it's important to remember that MFA isn't foolproof. It can be bypassed, and it often [...]

By |2024-02-13T08:30:59-05:00February 12th, 2024|Categories: BMT Announcement|

Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade

The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some critical infrastructure networks in the country for at least five years. Targets of the threat actor include communications, energy, transportation, and water and wastewater systems sectors in the U.S. [...]

By |2024-02-08T14:05:44-05:00February 8th, 2024|Categories: BMT Announcement|
Go to Top