Contact Us Today!

New VMware Ransomware “Cheers”

A new ransomware named ‘Cheers’ is targeting VMware ESXi servers. VMware is a virtualization platform used by many large corporations. It has been targeted recently by many ransomware groups with the most recent attacks being LockBit and Hive.

When a VMware ESXi server is compromised, the attacker launches an encrypter which will stop all running virtual machines.

VMWare Exploit CVE-2022-22972

A VMware exploit is now available online which affects Workspace ONE Access, VMWare Identity Manager, and vRealize automation. The exploit has been given a CVE number of 2022-22972.

The exploit allows the attacker to bypass authentication and gain administrator permissions to the applications stated above.

5 Most common security breaches

From attacks on mobile devices to ever-increasing types of malware, cybersecurity has never been more challenging and important. One of the best ways to stay protected is to be aware of cybersecurity threats. Here are five common ways your IT systems can be compromised.

Surf securely with a VPN

There was a time when installing an antivirus program was enough to secure your data, but that’s no longer the case today. Whether you want to keep your online activities hidden from third parties or prevent your data from being intercepted by hackers, you need to invest in a virtual private network (VPN).
What is a VPN?
A VPN creates a secure tunnel between your device and the websites you visit, protecting you from hackers looking to intercept your data.

Tips for keeping your email safe

People rely on email to do a wide array of tasks. We use it to sign up for websites, apply for jobs, make payments, get in touch with friends and family, and many more. However, email is also commonly exploited by hackers to steal information or launch malware attacks.

The threat of distributed spam distraction

You wouldn’t think that cyber criminals would carry out their nefarious schemes in plain sight — except that they do and you’ve probably already fallen victim to them. Learn all about a scheme called distributed spam distraction (DSD) and how malicious actors are using it to steal valuable information from their victims.

Prevent Data Loss in Microsoft 365 with these 7 security tips

Microsoft understands the value of business data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Microsoft 365 subscribers. But given the increasing sophistication and frequency of data breaches, these cloud security solutions aren’t enough to protect your files.

Tips to Keep Your Mobile Devices Safe

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses.

Are your business printers protected against hacks?

When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first, and printers last. Did you know that printers can be exploited by hackers and used as a gateway to access your company's systems? Are your business printers protected against hacks? Here at Beringer Technology Group we often encounter unsecured printers with new managed services clients.