BMT

BMT tops CRN’s MSP 500 list in 2026

Business Machine Technologies is proud to be named in CRN’s 2026 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This recognition highlights our continued commitment to delivering secure, scalable IT solutions that enhance efficiency and drive business success. CRN’s MSP 500 list identifies top North American [...]

2025 NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2025 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

Catch-IT: Multiple Vulnerabilities Discovered in Apple Products

Multiple vulnerabilities (CVE-2024-44308 and CVE-2024-44309) have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.  Depending on the privileges [...]

By |2024-11-21T15:35:45-05:00November 21st, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion web browser users, the improved tool aimed to stop [...]

Microsoft Cracking Down On Security

Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and been worried about recent Microsoft attacks that are now [...]

Cybersecurity Advances and Their Critical Role in Protecting Business Assets

Your business is only as efficient as its technology, as safe and protected as its security measures, and as reputable as its actions. When keeping all these factors in line, you need the right cybersecurity practices to ensure your equipment, browsers, and employee ventures are not threatening your company, [...]

Latest Trick – Malware Disguised as VPN

Suppose your employees use a VPN to access your company’s network when working remotely securely. In that case, you must know the latest threat targeting enterprises. Researchers have discovered that threat actors release malware disguised as VPN services, tricking users into downloading a malicious version of a well-respected VPN [...]

By |2024-09-19T13:01:03-05:00September 19th, 2024|Categories: News|Tags: , , , , , , , , , , |

WhatsApp for Windows Security Flaw

Suppose your company uses the popular messaging platform WhatsApp for Windows. In that case, you need to be aware of a potentially critical security flaw that puts your company at risk for a disruptive and costly breach. Users discovered the flaw in June 2024. It allows certain risky file [...]

By |2024-09-18T07:54:23-05:00September 18th, 2024|Categories: News|Tags: , , , , , , , , , , |

Protecting Your Google Workspace Account From Cyber Threats

If your company relies on Google Workspace, you must know about the latest cyber threat. As you know, setting up a new user account in Google Workspace requires email authentication. Hackers uncovered a vulnerability in Google’s protocols that bypassed this authentication process. The vulnerability allowed bad actors to create [...]

By |2024-09-16T11:38:32-05:00September 16th, 2024|Categories: News|Tags: , , , , , , , , , , |

Zoom Supports Calls with Up to One Million People

If you’ve ever been on a Zoom call and thought, “It would be great if more people could join in,” you’re in luck. The biggest name in video conferencing software just announced that event organizers can host up to one million attendees on a single-use webinar, significantly increasing from [...]

By |2024-09-13T09:03:54-05:00September 13th, 2024|Categories: News|Tags: , , , , , , , , , , |

Microsoft Apps on MacOS: Privacy Issues

Suppose you use Microsoft productivity apps like Microsoft Word for Mac. In that case, you need to know about a new report from cybersecurity researchers from Cisco Talos. According to the latest report, many of the most common Microsoft apps on MacOS have a significant vulnerability that could put [...]

Go to Top