Microsoft ODBC Driver Remote Code Execution Vulnerability (CVE-2024-26162)

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application.
VMWare ESXi 7.0 and 8.0 Multiple Vulnerabilities

A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox.
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability (CVE-2024-26192)

An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website.
Critical Connectwise ScreenConnect Vulnerabilities (CVE-2024-1709 & CVE-2024-1708)

ConnectWise ScreenConnect 23.9.7 and prior are affected by an authentication bypass using an alternate path or channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
Cornerstone Information Technologies, LLC Recognized on CRN’s 2024 MSP 500 List

CRN®, a brand of The Channel Company, has named Cornerstone.IT to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2024.
Microsoft Exchange Server Elevation of Privilege Vulnerability

Leaked credentials can then be relayed against the Exchange server to gain privileges as the victim client and to perform operations on the Exchange server on the victim’s behalf.
Multiple Microsoft Outlook Vulnerabilities

A complete vendor solution is available. Either the vendor has issued an official patch, or an upgrade is available.
Cornerstone.IT Announces Key Leadership Promotions to Enhance Operations and Client Services

NEW YORK, NY, February 1, 2024 — Cornerstone Information Technologies, LLC (Cornerstone.IT,) a trusted leader in Managed IT and Project Services to law firms, is excited to announce a series of strategic leadership promotion
Managed Services: A Legal Lifeline

The business landscape, with increasingly complex security requirements and a patchwork of legal privacy frameworks across the globe, makes for a daunting challenge.
How to Efficiently Address Your Client’s Technical Security Requirements

Cybersecurity is not only a technical issue but also a strategic and competitive one.