Alleged Cyberattack Sets Off Israeli Missile Sirens

Cyberattacks comes in many shapes and sizes: Hackers use the tools at their disposal to go after companies and organisations with different goals, such as money, power, or simply to “troll.” However, sometimes, the stakes are much higher: Global powers utilize cyberattacks to their political advantage, to send a message, or to start a conflict. We may have seen the …

Microsoft Patches 55 Vulnerabilities, Including Zero-Day ‘Follina’

Microsoft’s Patch Tuesday is, at this point, security tradition. The company issues new software updates for machines running Windows on the second Tuesday of every month, containing patches for security vulnerabilities discovered since the last Patch Tuesday. Microsoft’s latest update dropped on Tuesday, June 14, and carried with it dozens of patches for Windows, including a fix for a serious …

Four Steps to Address the Threat of Ransomware

Ransomware is a concerning trend in the modern business world. With each new cybersecurity story that makes the news, it may seem nearly impossible to protect your business from these devastating attacks. However, if you follow certain best practices, you can help protect your network inside and out, while prevent hackers and attackers from negatively affecting your business. Make sure …

Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability

Last week, we covered “Follina,” the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to “SearchNightmare,” another Microsoft vulnerability. SearchNightmare is not unlike Follina: like the latter, SearchNightmare tricks the victim into opening a malicious document, such as Word …

Make Sure Your Systems Are Protected From Severe Weather

Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business is protected from whatever Mother Nature throws our way. Cox has an eight-step guide to ensure your business and its …

Watch Out for This Microsoft Office Vulnerability

Security vulnerabilities aren’t fun, especially when they affect products we rely on every day. A new vulnerability, dubbed “Follina,” unfortunately targets a suite of apps you likely use all the time: Microsoft Office. Follina, which Microsoft has identified as CVE-2022-30190, is a remote code execution vulnerability. When exploited, a bad actor can use this vulnerability to run arbitrary code with …