News and Blog

Chrome Sandbox Zero-day Vulnerability

CVE-2025-2783 is a high-severity zero-day vulnerability in Google Chrome that allows attackers to bypass the browser’s sandbox protection through a logical error at the intersection of Chrome’s security framework and the Windows operating system. This vulnerability enables remote code execution and system compromise.
Read More

Widespread Fake CAPTCHA Campaign Delivering Malware

Our partner, Arctic Wolf, has reported an ongoing campaign targeting websites across various industries with a fake CAPTCHA attack, where victims are presented with a challenge that ultimately leads to the loading of information stealer malware. We strongly encourage you to review the provided details and take appropriate measures to mitigate the associated risks.
Read More

Advantages of working with a smaller MSP

When it comes to managing your business’s IT needs, choosing the right Managed Service Provider (MSP) can make all the difference. While large, national MSPs might have greater resources and reach, that scale often comes at a cost, both in hard dollars and approach. Patrick Boyd outlines some of the advantages a smaller MSP can offer.
Read More

Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance

WATERLOO, ONTARIO and EDEN PRAIRIE, MINNESOTA – December 16, 2024 – Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, today announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance® endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.
Read More

Understanding the Anatomy of a Breach and How to Protect Your Firm

Join Cornerstone.IT & Arctic Wolf, ILTA technology leaders, for an engaging and informative session as we discuss the cybersecurity landscape and how to ensure you are being proactive with your firm’s security posture in 2025. As cyberattacks continue to evolve, it’s critical to understand the strategies bad actors use and how to protect sensitive client data and your firm’s reputation.
Read More

Future-Proofing Your Law Firm: Key IT Investments for 2025

As a law firm CIO or COO, planning your 2025 information technology budget involves anticipating future needs, addressing current challenges, and leveraging technology to enhance attorney productivity and security. Firms will need to continue to invest in their cloud migration and hybrid-work plans, but here are some other critical areas to focus on.
Read More
Why Do a Tech Assessment?

Why Do a Tech Assessment?

Whether you do them yourself or get some help, taking stock of your technology, your team’s skills and your processes is never a bad thing.  Many firms do them every few years as a self-check.  They help you identify gaps that need to be addressed and points the way to solutions that may not be evident until you see everything summarized in one place.
Read More
Cornerstone.IT