Latest from WME Blog - Page 9

White House Post-Quantum Cryptography Announcement

Quantum computing is a real technological boon. In fact, it is able to undermine the current foundations of cybersecurity.

So, on August 13, 2024, the U.S. Government achieved a major milestone by announcing the standardization of 3 new encryption algorithms designed specifically against the formidable power of quantum computers.

We all know traditional encryption methods

GhostWrite Vulnerability in T-Head CPUs Exposes Devices to Unrestricted Access
Overview
A critical architectural flaw in T-Head’s XuanTie C910 and C920 RISC-V CPUs was uncovered by recent research from the CISPA Helmholtz Center for Information Security. Dubbed GhostWrite, the vulnerability is baked directly into the CPU hardware, which makes it tremendously hazardous, as most security measures are incapable of intercepting the attack. GhostWrite, unlike

In 2024, mergers and acquisitions have slowed significantly compared to 2022-2023. But, we predict a massive uptick in the last third of 2024. Companies that held back the previous year are now gearing up for major moves.

So, we need to prepare for a surge in migrations.

“Don’t let this M&A upturn catch you off guard,” warns Vickie Moore of

Microsoft Discloses Unpatched Office Vulnerability Leading to Data Exposure
Overview
Microsoft issued a critical warning about an unpatched zero-day vulnerability in its Office suite. It has been identified as CVE-2024-38200 as it poses a big risk of unauthorized data exposure. The flaw has a CVSS score of 7.5 as it affects multiple versions of Microsoft Office, including Office 2016, Office

DoJ and FTC File Lawsuit Against TikTok for Violating Children’s Privacy Laws
Overview
The U.S. Department of Justice and the Federal Trade Commission have filed a lawsuit against TikTok. They allege that TikTok has been violating US laws of children privacy.
Impact
They say TikTok let kids make accounts, even though they knew how old they were. It’s crazy –

WME is a steadfast Microsoft collaborator that delivers top-tier Microsoft solutions and expert services. We strive to empower businesses to protect their SharePoint environments. We help them harness Microsoft Entra ID to further strengthen their SharePoint’s efficiency. Ultimately, we ensure that only authorised users can access your critical data.

Implementing Authentication Contexts with WME

We strengthen SharePoint security by seamlessly

Critical Vulnerability in Telerik Report Server Poses Remote Code Execution Risk
Overview
Progress Software issues a critical alert for users of their Telerik Report Server. The warning follows the identification of a significant security flaw, CVE-2024-6327. It has been assigned a CVSS score of 9.9, which means it is highly severe. The affected versions include Telerik Report Server version 2024 Q2

Imagine you’re merging two companies. It’s a promising process, but there’s a lot to figure out. Basically, navigating the mergers and acquisitions (M&A) world is no small feat.

That’s where Windows Management Experts (WME) comes in. We’re experts in helping companies navigate the twists of mergers or acquisitions. Our deep industry knowledge enables organizations to tackle these challenges effectively.

This

Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware
Overview
A suspected pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with advanced Android spyware. The operation is associated with the activity cluster codenamed OilAlpha. It utilizes malicious mobile apps to harvest sensitive info from their victims.
Impact
The OilAlpha group specifically targets humanitarian organizations i.e. CARE International, the Norwegian

Migrating to Microsoft 365 offers undeniable benefits, but it also creates a new attack surface. However, the unmatched convenience of Microsoft 365 can be undermined if attackers exploit weaknesses that bridge the gap between your on-prem environment and the cloud. This blog post dives into the tactics real-world attackers use to infiltrate Microsoft 365 through on-prem vulnerabilities. We’ll also