Alert: New Malware called “FoggyWeb” enables hackers to steal Admin Credentials Urgency/Severity: CRITICAL Issue / Vulnerability Digitaltrends.com summarizes the issue as follows: Microsoft has recently discovered another type of malware, named FoggyWeb by Microsoft, that hackers are currently using to remotely steal network admin credentials. The credentials allow the attacker group, which the company has called Nobelium, to hack into admin accounts of the Active Directory Federation Services’ (AD FS) servers and control users’ access [...]
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Windows Print Spooler Remote Code Execution Vulnerability Urgency/Severity: CRITICAL Issue / Vulnerability Microsoft is aware of and investigating a remote code execution vulnerability that affects Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability. This is an evolving situation and we will update the CVE as more information is available. A [...]
New York, NY, June 24, 2021 – Cornerstone.IT has taken security to the next level by adopting the National Institute of Standards and Technology (NIST) controls typically used for government agencies and Department of Defense contractors.
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Critical Citrix Vulnerability Allowing Malicious Attack Urgency/Severity: HIGH Issue / Vulnerability Multiple vulnerabilities have been discovered in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO.These vulnerabilities, if exploited, could result in the following security [...]
Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have. #ITCornerView Product Security Alert: Secure Your Dell Laptops and Desktops Now Issue/Vulnerability:Critical Vulnerability on Dell Laptops and Desktops running on Windows may lead to escalation of privileges, denial of service, or information disclosure Urgency/Severity: HIGH Scope A driver (dbutil_2_3.sys) packaged with Dell Client firmware update utility packages and software tools contains an insufficient access control vulnerability [...]
Hafnium operators deploy web shells on compromised server, creating software backdoors that allow attackers to steal data and perform additional malicious actions that lead to further compromise.
As of February 9, 2021, any Microsoft customer that has a supported version of Windows Server that is used as a Domain Controller in their environment will no longer allow legacy, unsupported Windows systems to talk to the supported Windows Server Domain Controller unless specific action takes place.
On February 11, 2020: Barton LLP, NYC hosted, “How Does the New NYS Cybersecurity & Privacy Law (SHIELD Act) Impact Your Business?”, an ILTA event presented by Jim Moreo of Cornerstone.IT & Kenneth N. Rashbaum of Barton LLP
Cornerstone.IT Earns a Prevalent Business Partner Badge Demonstrating Its Commitment to Cybersecurity for the Legal Industry
Cornerstone Information Technologies (Cornerstone.IT) is pleased to announce that the company has earned a Prevalent Business Partner Badge in recognition of the company’s excellence in protecting its own data, and by extension, securing the sensitive data of its client Law Firms.
WASHINGTON (March 29, 2017) –– The Association of Corporate Counsel (ACC), a global legal association representing more than 42,000 in-house counsel in 85 countries, today announced the release of safety guidelines for outside counsel who have access to sensitive company data as part of their engagements with corporate law departments. The guidelines, "Model Information Protection and Security Controls for Outside Counsel Possessing Company Confidential Information," will serve as a benchmark for law firm cybersecurity practices. Encompassing [...]