What’s New

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messaging platform against future attacks arising from the threat of a practical quantum computer. "With compromise-resilient encryption and extensive defenses against even highly sophisticated quantum attacks, PQ3 is [...]

By |2024-02-22T13:49:30-05:00February 22nd, 2024|Categories: BMT Announcement|

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. "SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said. "The worm automatically searches through [...]

By |2024-02-22T13:45:56-05:00February 22nd, 2024|Categories: BMT Announcement|

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

How Businesses Can Safeguard Their Communication Channels Against Hackers

Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays, and overlaps. Externally, frustration-free customer communication is directly correlated to a positive customer experience and higher satisfaction. However, business communication channels are also a major target for [...]

By |2024-02-19T09:03:04-05:00February 17th, 2024|Categories: BMT Announcement|

Catch-IT: Multiple Vulnerabilities Found in Microsoft Products

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new [...]

By |2024-02-14T14:37:09-05:00February 14th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks

Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and large language models (LLMs) to complement their ongoing cyber attack operations. The findings come from a report published by Microsoft in collaboration with OpenAI, both of which said they disrupted efforts made [...]

By |2024-02-14T13:56:47-05:00February 14th, 2024|Categories: BMT Announcement|

Ubuntu ‘command-not-found’ Tool Could Trick Users into Installing Rogue Packages

Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and compromise systems running Ubuntu operating system. "While 'command-not-found' serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by [...]

By |2024-02-14T13:54:49-05:00February 14th, 2024|Categories: BMT Announcement|

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. "This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence [...]

By |2024-02-13T14:04:09-05:00February 13th, 2024|Categories: BMT Announcement|
Go to Top