Skip to content

4 Burning Questions on Business Continuity and Disaster Recovery

BCDR Webinar Recap Blog Post image

In this day and age, disaster has many forms, so it pays to be prepared. Click here to get a summary of our recent Business Continuity and Disaster Recovery webinar as two vCIO experts break down four pressing questions related to business continuity needs and disaster mitigation.

Read More

Apple NSO Zero-Click Zero-Day: Dataprise Defense Digest

Dataprise Defense Digest 550x550

Citizen Lab discovered a zero-day zero-click exploit against Apple’s iMessage. Dubbed FORCEDENTRY, it’s a zero-day exploit that targets Apple’s image rendering library, and is effective against Apple iOS, MacOS and WatchOS devices. They’ve attributed the exploit to the Israeli cyber mercenary group, NSO Group, that is responsible for creating the Pegasus spyware used in numerous high profile exploitations of celebrity, politician, and world leader mobile devices.

Read More

Microsoft MSHTML Remote Code Execution Vulnerability: Dataprise Defense Digest

Dataprise Defense Digest 550x550

A new vulnerability in MSHTML (Part of MS Office) is being actively exploited by malicious actors. This can enable malware execution through the MSHTML “web engine” functionality present in Office applications. The simplicity of opening a specially crafted MS Office document makes it ideal bait for phishing and spear-phishing attempts.

Read More

User Credential Leak from 2019 Fortinet SSL-VPN Vulnerability: Dataprise Defense Digest

Dataprise Defense Digest 550x550

In 2019, FortiGate firewalls had a zero-day vulnerability that was exploited globally, allowing attackers to harvest user VPN credentials, usernames and passwords, remotely. This vulnerability has been addressed and patched by Fortinet in 2019, however, recently, a database of more than 87,000 FortiGate SSL VPN credentials harvested in 2019 has been leaked to the Internet. Researchers have noted that while some of the credentials will no longer work, there are some that still do.

Read More

Here’s Why You Can’t Ignore T-Mobile’s Data Breach

T MobileΓCOs Data Breach

On August 17, 2021, T-Mobile learned that a bad actor illegally accessed personal data and stole data on 50 million customers. Click here to learn why this breach is significant and learn which steps to take to prevent a data breach at your own organization.

Read More

Building Zero Trust Security Architecture in the Hybrid Workplace

The Journey to Zero Trust in the Hybrid Workplace

Zero Trust Architecture is an end-to-end security strategy that provides your business with the ability to protect your most important data because you control access to it. Click here to learn the reasons why an organization should get started with implementing a Zero Trust architecture, and how it can go about doing so.

Read More

Google Chrome Vulnerability (CVE-2021-30563): Dataprise Defense Digest

Dataprise Defense Digest 550x550

Google has issued a warning regarding a serious vulnerability in their Chrome browser (affecting Windows, Mac, and Linux) that could potentially allow a malicious actor to take full control over a machine. Google urges users to update their browsers immediately. Currently it’s estimated that about 2 billion Chrome browser installs are vulnerable.

Read More