News and Blog
Steering Towards the Future: The AI Revolution in Legal Tech with iManage and Microsoft Copilot Integration
As we draw nearer to the introduction of iManage’s innovative Artificial Intelligence (AI) services at ConnectLive NYC, the anticipation is tangible. This groundbreaking initiative was a significant focus at the recent iManage partner conference.
Cornerstone.IT: Partnering Exclusively with Top-Tier Vendors for Premier Managed Services
Congratulations Arctic Wolf for being named a leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response report!
CISCO IOS and IOS XE Software Vulnerabilities
Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their Updates Channel.
Google Chrome (Desktop) Multiple Security Vulnerabilities
Multiple vulnerabilities found with desktop version of Google Chrome prior to version 123.0.6312.86
Mozilla Firefox Desktop – Critical Security Vulnerabilities
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.
Microsoft ODBC Driver Remote Code Execution Vulnerability (CVE-2024-26162)
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application.
VMWare ESXi 7.0 and 8.0 Multiple Vulnerabilities
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox.
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability (CVE-2024-26192)
An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website.
Critical Connectwise ScreenConnect Vulnerabilities (CVE-2024-1709 & CVE-2024-1708)
ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Cornerstone Information Technologies, LLC Recognized on CRN’s 2024 MSP 500 List
CRN®, a brand of The Channel Company, has named Cornerstone.IT to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2024.
Microsoft Exchange Server Elevation of Privilege Vulnerability
Leaked credentials can then be relayed against the Exchange server to gain privileges as the victim client and to perform operations on the Exchange server on the victim’s behalf.
Multiple Microsoft Outlook Vulnerabilities
A complete vendor solution is available. Either the vendor has issued an official patch, or an upgrade is available.
Cornerstone.IT Announces Key Leadership Promotions to Enhance Operations and Client Services
NEW YORK, NY, February 1, 2024 — Cornerstone Information Technologies, LLC (Cornerstone.IT,) a trusted leader in Managed IT and Project Services to law firms, is excited to announce a series of strategic leadership promotion
Managed Services: A Legal Lifeline
The business landscape, with increasingly complex security requirements and a patchwork of legal privacy frameworks across the globe, makes for a daunting challenge.
How to Efficiently Address Your Client’s Technical Security Requirements
Cybersecurity is not only a technical issue but also a strategic and competitive one.
Protect Your Firm in 2024
Join Cornerstone.IT and Arctic Wolf for this crucial presentation preparing you for the likelihood and impact of a cyber incident your firm could face in 2024.
Cornerstone.IT Partners with Arctic Wolf to Provide Security Operations Portfolio to Law Firms
We are officially announcing our strategic partnership to enhance Cornerstone.IT’s service offerings with Arctic Wolf’s leading security operations capabilities that are designed to prevent, detect, respond, and remediate cyber threats – all delivered through the Arctic Wolf® Security Operations Cloud.
Cybsersecurity Crossword Puzzle 3
Are you ready to put your cybersmart to the test? Unravel this crossword puzzle and enhance your data security knowledge. Stay tuned every Wednesday this Cybersecurity Awareness Month for a new challenge!
6 Key Components of a Successful Security Compliance Framework
If your business isn’t in compliance with certain security protocols, it can cost you. A lot. Important read:
#cloudsecurity