Blog
- Microsoft 365 Copilot Training for IT March 5, 2025Join us at Microsoft 365 Copilot Training for IT to learn how to use Microsoft Copilot to simplify your everyday tasks. During this free event, discover how Copilot can help you enhance efficiency, simplify complex tasks, and optimize technical workflows. You’ll be able to: Use Copilot to summarize the information in a product spec document […]blogmirnet
- CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How March 5, 2025Register Today! Take a Deep-Dive into Implementing CSF 2.0— The Why, What, and How To address the ever-evolving cybersecurity landscape and equip organizations with information and resources to more quickly and effectively manage cybersecurity risk and improve their cybersecurity posture, NIST published a significant update to the NIST Cybersecurity Framework in 2024—CSF 2.0—the first major […]blogmirnet
- Multiple Vulnerabilities in VMware ESXi, Workstation, and Fusion Which Could Allow For Local Code Execution March 5, 2025This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals. Multiple vulnerabilities discovered in VMware ESXi, Workstation, and Fusion could allow for local code execution. VMware ESXi, Workstation, and Fusion are all virtualization products that allow users to run virtual […]blogmirnet
- Considerations for Achieving Crypto Agility: NIST Releases CSWP 39 for Public Comment March 5, 2025Advances in computing capabilities, cryptographic research, and cryptanalytic techniques periodically create the need to replace algorithms that no longer provide adequate security for their use cases. For example, the threats posed by future cryptographically-relevant quantum computers (CRQCs) to public-key cryptography are addressed by NIST post-quantum cryptography (PQC) standards. Migrating to PQC in protocols, applications, software, […]blogmirnet
- North Korea Responsible for $1.5 Billion Bybit Hack March 3, 2025The Federal Bureau of Investigation (FBI) is releasing this PSA to advise the Democratic People’s Republic of Korea (North Korea) was responsible for the theft of approximately $1.5 billion USD in virtual assets from cryptocurrency exchange, Bybit, on or about February 21, 2025. FBI refers to this specific North Korean malicious cyber activity as “TraderTraitor.” TraderTraitor actors […]blogmirnet
- Threat Actors Exploit Trusted Accounting Software March 3, 2025Individuals and businesses may use trusted accounting software to keep track of finances, generate invoices, and run payroll. Accounting software can also automate bookkeeping, create reports, analyze financial trends, and organize and manage data, making tax season easier. The software is linked to a designated bank account to securely pull transactions automatically and update them […]blogmirnet
- Account Compromises March 3, 2025According to 2024 statistics, the United States is one of the top countries for account compromises or account takeovers (ATOs). Microsoft and Amazon are among the top five domain sources for these attacks. The percentages of targeted and impacted industries are relatively prevalent across the board. The NJCCIC continues to receive reports of compromised accounts […]blogmirnet
- NIST CSF 2.0 Profile for Semiconductor Manufacturing March 3, 2025The NIST National Cybersecurity Center of Excellence (NCCoE), along with the SEMI Semiconductor Manufacturing Cybersecurity Consortium, has released Draft NIST Internal Report (NIST IR) 8546, Cybersecurity Framework (CSF) 2.0 Semiconductor Manufacturing Community Profile for public comment until 11:59 PM ET on Monday, April 14, 2025. About the Draft Draft NIST Internal Report (IR) 8546, Cybersecurity […]blogmirnet
- NCCoE Cybersecurity and AI Workshop March 3, 2025Event Date: April 3, 2025 Event Time: 9:00 AM – 5:00 PM EST Event Location: Virtual and at the National Cybersecurity Center of Excellence (NCCoE) Recent advancements in Artificial Intelligence (AI) technology bring great opportunities and challenges to organizations, including how AI can affect their cybersecurity capabilities and risks. The potential positive and negative impacts […]blogmirnet
- Microsoft Security Public Webinars February 21, 2025February 12 – Microsoft Defender XDR: How to Get the Most Out of Microsoft Defender for Vulnerability Management (MDVM) February 18 – Setting up Microsoft Entra Verified ID, step by step. February 18 – Microsoft Defender XDR AMA – Automatic Attack Disruption February 19 – Security Copilot in Entra: Addressing App Risks and High-Privilege Permissions […]blogmirnet