ATC Blog
IoT Security With Microsoft Defender
The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They are all connected to your home network, and they all make vast...
Microsoft 365 Suggests Rollback After Issues From Update
Does your company use Microsoft 365? If so, and you've noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the culprit. Unfortunately, the bug was introduced in the Enterprise channel...
Lenovo Models Affected By Medium Severity Vulnerabilities
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system. The issues are tracked as CVE-2022-1890, CVE-2022-1891, and...
Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that a determined attacker could bypass sandbox restrictions and execute malicious...
New Tools Available With Kali Linux 2022.3
Do you have the Kali Linux distribution running on one of the machines you own? If you're not sure what that is, then you almost certainly don't. Kali is a Linux distro used mostly by "ethical hackers" who use it mainly to perform security audits, cybersecurity research,...
Prepare For Windows Server 2012 End Of Support
Another week, another Microsoft "End of Life" reminder to write about. This time, it's Windows Server 2012 R2. If you're a user, then you're probably already aware of the looming deadline. If you've blocked it out of your mind, or if you've missed the notifications that...
Apple Users Will Want To Update As Soon As Possible
Do you own a device running macOS Monterey 12.5.1, or iOS/iPadOS 15.6.1? If so, you'll want to download and install the latest patches as soon as possible. Apple recently released a small but critical security update aimed at fixing a pair of serious vulnerabilities that...
Google Experiences International Outage
Just Google it." You've probably heard that phrase a thousand times. In fact, you may use it yourself on a regular basis. Unfortunately, Googling it wasn't possible recently. The iconic search giant went dark across broad swaths of the world and simply could not be...
Hackers Use VoIP Systems To Install PHP Web Shells
Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of all shapes and sizes to unify their communications, and it is especially...
WordPress NinjaForms Plugin Was Force Updated Due To Vulnerability
Do you run a WordPress site? Do you also use the popular forms design and management plugin called NinjaForms? If you answered yes to both of those questions, be aware that NinjaForms was recently found to have a critical security flaw. The flaw takes the form of a code...
The Small Business Cyber Crisis
Urgent And Critical Protections Every Business Must Have In Place NOW To Protect Their Bank Accounts, Client Data, Confidential Information And Reputation From The Tsunami Of Cybercrime.
Complete The Form Below To Claim Your FREE Urgent and Critical Protections Every Business Must Have In Place NOW!
Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.