top of page

TrustPoint Blog

Critical security information & helpful tips for small and mid sized organizations.
DEPENDABLE
FLEXIBLE
EXPERIENCED


New Malware Steals Password & Ignores MFA
A new strain of password-stealing malware is raising serious concerns for businesses by targeting the very tools employees rely on every day—web browsers like Chrome, Edge, and Firefox. This threat is designed to quietly extract stored credentials, session cookies, and authentication data directly from the browser, giving attackers access to accounts without needing to “hack” passwords in the traditional sense. Because modern browsers often store login sessions and autofill c
Nik Lipor
7 days ago1 min read


Fortinet Critical Vulnerability: API authentication and authorization bypass
A critical vulnerability has been identified in Fortinet security appliances that could allow attackers to gain unauthorized access to systems without proper authentication. In certain configurations, this flaw can be exploited to bypass login protections, effectively allowing a threat actor to impersonate a legitimate user or gain access without valid credentials. Because these devices are typically deployed at the edge of a network—protecting internet traffic, VPN access, a
Nik Lipor
Apr 51 min read


The Rise of Automated Credential Theft
A newly observed cyberattack campaign is highlighting just how quickly modern vulnerabilities can be weaponized at scale. Attackers are exploiting a critical flaw in widely used web applications to gain unauthorized access to systems, allowing them to execute commands remotely and extract sensitive data. What makes this especially dangerous is how simple the initial attack can be—requiring only a specially crafted request to gain entry into vulnerable environments. Once insid
Nik Lipor
Apr 51 min read


When Email Stops Flowing: Outlook Issues Impact Business Communication
Email remains one of the most critical communication tools for businesses, but recent issues affecting the classic version of Microsoft Outlook have highlighted how fragile that dependency can be. Some users have experienced problems sending emails, receiving non-delivery errors, or finding that messages never reach their intended recipients. In certain cases, these issues are tied to account configurations—particularly when Outlook profiles are connected to multiple accounts
Nik Lipor
Apr 51 min read


The Network Threat You Can’t See: Why Routers Are Under Scrutiny
The U.S. government has taken a significant step to address cybersecurity risks by restricting the approval and sale of new consumer-grade internet routers that are manufactured outside the country. This policy, driven by the Federal Communications Commission (FCC), is rooted in growing concerns that foreign-made networking equipment could expose American homes, businesses, and critical infrastructure to cyber threats. Officials have pointed to past incidents where vulnerabil
Nik Lipor
Mar 252 min read


FortiGate Firewalls Being Used as Entry Points for Cyber Attacks
Cybersecurity researchers are warning that attackers are actively targeting Fortinet FortiGate firewall devices as a way to break into corporate networks. In recent incidents, threat actors exploited vulnerabilities or weakly secured devices to gain access and extract sensitive configuration files directly from the firewall. These configuration files often contain valuable information such as network topology and service account credentials, which can give attackers insight i
Nik Lipor
Mar 102 min read


Blog Post: Apple Devices Targeted by Actively Exploited Vulnerabilities
Security officials are warning organizations and individuals about several vulnerabilities affecting Apple devices, including macOS, iOS, and iPadOS, that are currently being exploited in real-world cyberattacks. The vulnerabilities were recently added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities catalog, signaling that attackers are actively leveraging these flaws against targets. When vulnerabilities reach this list, it ty
Nik Lipor
Mar 91 min read


A Simple Checklist for Evaluating Your IT Support Provider
Choosing the right IT support provider is one of the most important decisions a business owner can make. The right partner should not only fix problems when they happen, but also help protect your business, simplify technology, and support your long-term growth. In this guide, we’ll walk through a simple checklist to help you determine whether your current IT support truly meets your business’s needs. ⬜ Do They Customize Their Support to Fit Your Business? No two businesses
Nik Lipor
Mar 43 min read


Critical Cisco Network Vulnerability: What Business Owners Should Know
A serious cybersecurity vulnerability has recently been discovered in widely used Cisco networking equipment that many businesses rely on to connect offices, employees, and cloud services. Security experts have warned that this flaw could allow attackers to break into affected systems without needing valid login credentials. Once inside, a hacker could potentially gain high-level control over the device, which sits at the heart of many business networks. Because these systems
Nik Lipor
Mar 42 min read


Urgent Alert: Google Rolls Out Emergency Patch for Chrome Vulnerability
In a critical move to safeguard users, Google has released an emergency update for its Chrome browser, targeting a serious zero-day vulnerability that's already under active exploitation. Identified as CVE-2026-2441, this flaw involves a use-after-free memory issue within the browser's Cascading Style Sheets functionality. As the first such zero-day reported in 2026, it poses a significant threat by potentially allowing attackers to crash the browser or corrupt data. The vuln
Nik Lipor
Feb 192 min read


Critical Windows Update Issues Are Causing Crashes and Boot Failures
A recent Windows security update released in late January has introduced serious stability problems for a number of Windows 11 systems, raising concerns across the business and IT community. While the update was intended to improve security and system reliability, many organizations have reported that it is instead triggering system crashes, black screens, and in some cases complete boot failures that prevent computers from starting at all. One of the most severe issues being
Nik Lipor
Jan 292 min read


How Hackers Are Turning Cyber Security Against You
Every day it feels like the world changes and businesses can barely keep up with protecting themselves. The biggest threats aren’t always coming from new malware strains or stealthy phishing campaigns — they’re also coming from trusted security software itself. A recent wave of cyberattacks has shown how threat actors are weaponizing legitimate security tools to disable endpoint defenses like antivirus and EDR (Endpoint Detection and Response) before launching destructive at
Nik Lipor
Jan 263 min read


Windows Update Breaks Outlook
If you’ve recently installed the latest Windows 11 update and found Microsoft Outlook behaving badly — freezing, crashing, or refusing to reopen — you’re not alone. A recent security update for Windows 11 has introduced a serious compatibility problem with the classic Outlook desktop client that’s affecting many users, especially those with POP-configured accounts or data files stored in cloud folders like OneDrive or Dropbox. What the Problem Looks Like After applying the mo
Nik Lipor
Jan 263 min read


New FortiOS Vulnerability
Fortinet recently disclosed a critical security vulnerability affecting FortiOS (used on FortiGate firewalls and related Fortinet platforms) as well as FortiSwitchManager. The issue is described as a heap-based buffer overflow within the cw_acd daemon, and the risk is severe because it can allow a remote attacker to execute arbitrary code or commands. Most concerning: the attack can be performed without authentication, meaning an exposed system could potentially be compromise
Nik Lipor
Jan 142 min read


Silent Threats in Your Browser: How Malicious Extensions Infected Millions
Browser extensions are incredibly useful tools. They can add features like productivity boosters, video helpers, new tab widgets, and more directly to your browser. But what many people don’t realize is that this convenience can come with serious hidden risks. Recently, a massive malware campaign was uncovered that highlights just how vulnerable browser extensions can be—and how quietly a threat can operate. A Long-Running Malware Operation Over a span of more than seven year
Nik Lipor
Jan 73 min read


How to Check Your Browser Extensions and Permissions Safely
Below is a simple, step-by-step guide anyone can follow to help keep their browser secure. Step 1: Review All Installed Extensions Open your browser’s extension manager: Chrome / Edge: Settings → Extensions Firefox: Add-ons and Themes → Extensions Carefully scan the list and ask yourself: Do I recognize this extension? Do I still use it? Do I remember installing it? If the answer is “no” to any of these, remove it. Unused extensions create unnecessary risk. Step 2: Check Exte
Nik Lipor
Jan 72 min read


Wisconsin's State and Local Cybersecurity Grant Program Opens for Round 2 Applications
Cyber threats are plaguing every organization and Wisconsin is stepping up with the State and Local Government Cybersecurity Grant Funding. Administered by Wisconsin Emergency Management (WEM) and the Division of Enterprise Technology (DET), this initiative—funded through the Infrastructure Investment and Jobs Act (IIJA)—empowers state, local, and tribal governments to fortify their digital defenses. The program's core mission is to enhance cybersecurity postures by addressin
Nik Lipor
Dec 11, 20252 min read


Happy Thanksgiving
Thanksgiving is more than a holiday—it’s a reminder of what matters most. Between the rush of work, appointments, and the demands of everyday life, it’s easy to get distracted by routine. But when we slow down, gather around the table, and look at the faces of the people who love us most, we remember that family is our real foundation. The laughter, the memories, the stories shared across generations—these are the moments that stay with us long after the dishes are done and t
Nik Lipor
Nov 25, 20251 min read


Act Now: Why That 24-Hour Upgrade Window from Microsoft Matters for Your Business
If your business is still running Windows 10, you’re now facing a critical decision point. Microsoft ended support for Windows 10 October 14, 2025 . After that date, Windows 10 devices no longer received security updates, feature updates, or technical support—leaving them at elevated risk. But here’s the twist: Microsoft is offering an extension via the “Extended Security Updates” (ESU) program—effectively giving you extra time to secure your systems. The catch? You need to
Nik Lipor
Nov 10, 20253 min read


Urgent Warning for Businesses: BitLocker Recovery Triggered After Recent Windows Update
If your organization is running Windows 11 (versions 24H2 or 25H2) or even Windows 10 22H2 (you should not be running Windows 10 unless you have paid for extended security updates), there’s a serious issue you need to know about: a recent update has been confirmed to trigger the BitLocker recovery screen unexpectedly on affected machines. What’s happening? After installing the October 2025 update (and subsequent patches) on certain devices, users may be prompted to enter the
Nik Lipor
Nov 6, 20253 min read
Address
2310 S. Green Bay Rd
Suite C #281
Racine, WI 53406
bottom of page
