Scary Stats Cybersecurity

Security Advisory – Zero Day – Follina

  6/1/22 Teqworks Managed Security has been monitoring the development of an active zero-day threat, referred to as “Follina” (CVE-2022-30190).  This vulnerability was originally identified on May 27, and security platforms continue to update as details emerge. In short, an attacker can utilize the Microsoft Support Diagnostic Tool (MSDT) to run arbitrary code on a computer

Security Advisory – Zero Day – Follina Read More »


Part I: The Teqworks Way

Most small businesses – 60%, reportedly – will not survive the year after experiencing a data breach, usually closing doors within 6 months.​ Every day, the IT environments of countless businesses and corporations around the world are under attack. Whether they know it or not, sinister entities are plotting heinous acts aimed towards compromising confidential

Part I: The Teqworks Way Read More »

Remote Code Execution (RCE) Vulnerability CVE-2021-44228 

On Dec. 9, 2021, a remote code execution (RCE) vulnerability CVE-2021-44228 in Apache log4j 2 was identified and attackers are already actively exploiting this vulnerability. Since the advent of this issue, Teqworks has been consulting security partners and evaluating our and your systems for exposure to this vulnerability. Teqworks internal systems do not use Apache log4j library.

Remote Code Execution (RCE) Vulnerability CVE-2021-44228  Read More »

Teqworks Statement on Sunburst, SolarWinds, and FireEye Security Issue

On December 13, 2020, the US Cybersecurity and Infrastructure Security Agency alerted the general public of a known active exploitation of SolarWinds Orion and FireEye, software that is frequently used to support and monitor computer systems and networks.  This exploitation is currently referred to as Sunburst. Teqworks does not use any SolarWinds or FireEye products

Teqworks Statement on Sunburst, SolarWinds, and FireEye Security Issue Read More »

Scroll to Top