Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber...
Hackers Send Compainies USB Drive with Ransomware
The FBI is warning companies that hackers are mailing USB drives loaded with ransomware. They include letters purporting to be from The...
Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation
The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228)...
Disable Print Spooler
CISA is recommending disabling the print spooler service on all computers that don't print. Read more here. https://us-cert.cisa.gov/nc...

New sophisticated email-based attack from NOBELIUM
Microsoft Threat Intelligence Center (MSTIC) Microsoft 365 Defender Threat Intelligence Team Microsoft Threat Intelligence Center (MSTIC)...


Critical Exchange Update
Recently discovered security flaws in Microsoft Exchange Server could allow attackers to access email accounts and steal potentially...
Apple Releases Security Updates
Original release date: February 9, 2021 Apple has released security updates to address vulnerabilities in macOS Big Sur 11.2, macOS...
Fraudsters Used AI to Mimic CEOโs Voice in Unusual Cybercrime Case
Criminals used artificial intelligence-based software to impersonate a chief executiveโs voice and demand a fraudulent transfer of...

Internet Explorer 11 Will No Longer Work With Teams After November 30
Microsoft 365 apps and services will be focusing their efforts on modern browser support over the coming year. As a result, the Microsoft...