Don’t be that employee: How to avoid ransomware attacks at work

For more details, I encourage you to check out the in-depth article from The Washington Post. Tempting clicks Often, bad actors trick employees by using websites, URLs and email addresses that are just a letter or two off from their legitimate counterparts. For example, BigBossCEO@Company.com becomes B1gB0ssCEO@Company.com. If an email looks suspicious, hunting for alternate

By |2021-09-15T11:32:18-04:00September 15th, 2021|Security Updates|

2021-09-08: Office Document Attacks

2021-09-08: Exploit Mitigation for Microsoft MSHTML Remote Code Execution Vulnerability Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents. This attack can be mitigated using some registry edits as documented

By |2021-09-13T09:03:59-04:00September 8th, 2021|Security Updates|

2021-07-06: Print Server Exploits

2021-07-06: Fix for PrintNightmare exploit until a patch is available From Microsoft's Windows Print Spooler Remote Code Execution Vulnerability A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install

By |2021-09-08T12:00:04-04:00July 6th, 2021|Security Updates|
Go to Top