Call Us Today at: 503-850-3055

Blog

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

August 26, 2022BlogNo Comments »

MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that a determined attacker could bypass sandbox restrictions and execute malicious code arbitrarily.  Engineers at Microsoft discovered the vulnerability, and independent security researcher Arsenii Kostromin discovered it independently. Both...

Read More

Lenovo Models Affected By Medium Severity Vulnerabilities

Lenovo Models Affected By Medium Severity Vulnerabilities

August 25, 2022BlogNo Comments »

If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system. The issues are tracked as CVE-2022-1890, CVE-2022-1891, and CVE-2022-1892 and are all classed as medium severity level. The first of these is an issue...

Read More

Microsoft 365 Suggests Rollback After Issues From Update

Microsoft 365 Suggests Rollback After Issues From Update

August 24, 2022BlogNo Comments »

Does your company use Microsoft 365?  If so, and you've noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the culprit. Unfortunately, the bug was introduced in the Enterprise channel during the company's regularly scheduled "Patch Tuesday." The error manifests itself when users try to open a contact...

Read More

IoT Security With Microsoft Defender

IoT Security With Microsoft Defender

August 23, 2022BlogNo Comments »

The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They are all connected to your home network, and they all make vast amounts of data available to you at your fingertips. Unfortunately, security is slim to non-existent on...

Read More

Hackers Use VoIP Systems To Install PHP Web Shells

Hackers Use VoIP Systems To Install PHP Web Shells

August 22, 2022BlogNo Comments »

Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of all shapes and sizes to unify their communications, and it is especially attractive because it can be used with the Digium phones module for FreePBX. So far, the...

Read More

Google Experiences International Outage

Google Experiences International Outage

August 20, 2022BlogNo Comments »

"Just Google it."  You've probably heard that phrase a thousand times.  In fact, you may use it yourself on a regular basis. Unfortunately, Googling it wasn't possible recently.  The iconic search giant went dark across broad swaths of the world and simply could not be accessed at all for thirty 34 very long minutes. It was a very strange experience,...

Read More

Apple Users Will Want To Update As Soon As Possible

Apple Users Will Want To Update As Soon As Possible

August 19, 2022BlogNo Comments »

Do you own a device running macOS Monterey 12.5.1, or iOS/iPadOS 15.6.1? If so, you'll want to download and install the latest patches as soon as possible. Apple recently released a small but critical security update aimed at fixing a pair of serious vulnerabilities that could allow an attacker to execute arbitrary code on an unpatched device. The two issues...

Read More

Raspberry Robin Worm In Hundreds Of Windows Networks

Raspberry Robin Worm In Hundreds Of Windows Networks

August 18, 2022BlogNo Comments »

Analysts at Red Canary Intelligence have recently spotted a Windows worm on hundreds of networks belonging to a wide range of organizations around the world. Dubbed "Raspberry Robin" by the research team that discovered it, this worm spreads via infected USB devices and was initially spotted in September of last year (2021).  Another firm, Sekoia, observed the worm even earlier,...

Read More

The Importance Of Having An Email Newsletter

The Importance Of Having An Email Newsletter

August 17, 2022BlogNo Comments »

Most business owners understand the importance of being active on at least one social media channel. That's fine as far as it goes, but have you considered supplementing your social media presence with a good, old-fashioned newsletter? Of course, when we say newsletter, we're not talking about something you print and mail to your customers but rather something you publish electronically...

Read More

Prepare For Windows Server 2012 End Of Support

Prepare For Windows Server 2012 End Of Support

August 16, 2022BlogNo Comments »

Another week, another Microsoft "End of Life" reminder to write about. This time, it's Windows Server 2012 R2.  If you're a user, then you're probably already aware of the looming deadline. If you've blocked it out of your mind, or if you've missed the notifications that Microsoft has been sending out, here's what you need to know. The End-of-Life deadline...

Read More