Latest Article
Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads
An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The email passed every major email authentication check. But the board itself contained a malicious link. This is an example of platform abuse, where attackers use legitimate cloud services to deliver…
Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads
July 23, 2025
An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…
CodeTwo Email Signatures and Why We Use It
March 31, 2025
CodeTwo Email Signatures 365 is a centralized system for managing email signatures, disclaimers, auto-replies, and marketing banners across Microsoft 365 environments. It is the only solution of its kind certified by Microsoft and used by…
Why You Should Block DeepSeek and Build a Safer AI Strategy
March 20, 2025
AI platforms are changing the way businesses operate, but not all AI tools meet basic security expectations. DeepSeek AI has emerged as a significant risk for organizations concerned with data privacy and regulatory compliance. The…
Password Managers: Can They Be Hacked?
February 6, 2025
In our everyday digital interactions, securing our online presence is more critical than ever. Password managers have emerged as key tools in this endeavor, promising to safeguard our numerous passwords with a single master key.…
The Future of Network Security: Zero Trust VPN
January 18, 2025
Traditional VPN solutions, such as Microsoft VPN or OpenVPN, have served their purpose but are now inadequate in the face of increasingly sophisticated cyber threats. Zero Trust Networks introduce a robust, modern security framework that…
We’ve Gone Dark: Easier on Your Eyes, Better for You
November 26, 2024
Lumitiv, your all-in-one IT department, is excited to announce the launch of our newly redesigned website featuring a sleek dark theme. This transformation aligns with our commitment to simplify technology while prioritizing the well-being of…
Critical Security Flaws Found in All NVIDIA GeForce GPUs
November 5, 2024
NVIDIA has issued an urgent warning to all users of its GeForce GPUs after discovering multiple high-severity vulnerabilities in its GPU drivers and software. These security flaws could allow attackers to gain full access to…
KnowBe4 Hires Fake North Korean IT Worker
July 25, 2024
KnowBe4 is a prominent cybersecurity awareness training platform founded by Stu Sjouwerman in Florida, specializing in educating employees about the threats posed by cybercriminals, including advanced persistent threats, social engineering tactics, and insider threats. Through…
CrowdStrike Falcon Causing BSOD? Here’s How to Fix It
July 19, 2024
Updated 7/19/2024 8:55AM MST CrowdStrike, a leading cybersecurity company, confirmed that an issue with its Falcon Sensor software is causing Windows systems to crash. The Falcon Sensor is an endpoint detection and response system designed…
Secure Your Social Media Accounts from Being Hacked
July 18, 2024
Social media connects us with friends, family, and colleagues, but it also comes with the risk of unauthorized access. Protecting your social media accounts is essential to keep your personal information safe. Each year, the…
Why the Kaspersky Ban Isn’t a Concern
June 27, 2024
The recent news about the U.S. Department of Commerce’s decision to ban Kaspersky Lab from operating in the United States might seem concerning at first glance. However, we believe this decision has limited real-world impact…
Early Highlights of the Windows 11 24H2 Update
March 22, 2024
The Windows 11 24H2 update introduces Sudo for Windows, enhanced hearing aid compatibility, and additional features, marking significant improvements in user experience and system performance.