CyberSecurity

Catch-IT: Facebook Business Users Beware, Thousands Hit by New Phishing Scam

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices. The phishing emails have targeted more than 12,000 email addresses at hundreds of companies. Nearly all of the emails targeted individuals in the US, the EU, and Australia, though the researchers also [...]

Catch-IT: Beware of Uptick in Phishing Tactics

Vishing, Whaling, SMiShing...what do these things have in common?  Although seemingly tied to nautical terms, they are all common phishing tactics.  Phishing is a type of social engineering attack that uses email, phone, social media, and other means of personal communication to trick people into providing sensitive information.  So, what [...]

Catch-IT: Multiple Vulnerabilities in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could [...]

Catch-IT: Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a [...]

Catch-IT: Ransomware on the Rise

 Ransomware Continues to Gain Momentum Ransomware continues to dominate the threat landscape, posing significant risks to organizations. The NJCCIC continues to receive reports of ransomware incidents impacting New Jersey private and public sector organizations, including educational institutions and local governments. Fog ransomware and 3AM ransomware are two significant variants [...]

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

3 Important Considerations for 2024

With 2024 in full swing, we know budgets have been prepared and are in full-swing implementation.  Hoping you made considerations in security investments for the coming year to better protect your organization from growing threats, we wanted to highlight 3 things for consideration.  If you haven't given these areas [...]

By |2024-01-17T12:25:24-05:00January 17th, 2024|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger

A new phishing attack is leveraging Facebook Messenger to propagate messages with malicious attachments from a "swarm of fake and hijacked personal accounts" with the ultimate goal of taking over the targets' accounts. "Originating yet again from a Vietnamese-based group, this campaign uses a tiny compressed file attachment that [...]

By |2023-09-12T07:35:24-05:00September 11th, 2023|Categories: BMT Announcement, CyberSecurity|

It’s Password Day! Our Tech Leaders List Best Practices for Secure Accounts

Not yet Cinco de Mayo, today we celebrate an equally festive day (in techie minds) - World Password Day!! Celebrated the first Thursday of May, Password Day was created to raise awareness about the importance of password security, the most prominent threats, and best practices for users to follow. [...]

By |2023-05-04T11:50:50-05:00May 4th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

Phishing Email Refresher – Know What to Look For!

Phishing emails continue to grow in volume and sophistication.  Hackers are doing due diligence and making emails more personalized, thus easier to fall for.  In addition, the availability of AI tools allows for generation of beautifully written, well-structured emails on just about any subject.  Foreign hackers can even write [...]

By |2023-04-27T12:26:45-05:00April 27th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

New Tool Prevents Company Secrets from Being Fed to ChatGPT

The surge in using artificial intelligence tools like ChatGPT has already resulted in workers leaking sensitive company data to bots, but a new technology aims to protect company data. In fact, it's already happening. Samsung recently experienced a series of leaks after employees purportedly pasted source code into the new bot, [...]

By |2023-04-26T11:59:03-05:00April 26th, 2023|Categories: CyberSecurity, News|Tags: , , , , , , |

Free Cybersecurity Tool You Need To Be Using

Cybersecurity Professionals use this Tool Every Day. Have You Tried It? Have I Been Pwned Created by award-winning cybersecurity thought leader and teacher Troy Hunt, Have I Been Pwned is a website where you enter your email address to check if your address has been revealed in a data breach. [...]

Go to Top