Feds Gave 48 Hours to Patch SharePoint or Pull the Plug

Feds Gave 48 Hours to Patch SharePoint or Pull the Plug

Feds Gave 48 Hours to Patch SharePoint or Pull the PlugMat Kordell | Chief Operating Officer | CyberStreams
Published on: 08/10/2025

Imagine SharePoint as your company's hyperactive digital filing cabinet, stacked with contracts, client records, strategy docs, and your secret sauce recipes, all accessible to your team. Now, picture a gang of cybercriminals picking the digital lock, slipping in through an undisclosed flaw, and planting ransomware or siphoning off your most valuable data.

System Updates
Are You Hiring a Hacker?

Are You Hiring a Hacker?

Are You Hiring a Hacker?Mat Kordell | Chief Operating Officer | CyberStreams
Published on: 08/10/2025

Think of your hiring process as a digital gatekeeper checking IDs, verifying résumés, and deciding who gets access to your systems. But what if that gatekeeper is being fooled? What if the “IT freelancer from Ohio” your team just hired is actually a North Korean operative running malware from a secret laptop farm?

System Updates
Handing Cyber Keys to the Enemy

Handing Cyber Keys to the Enemy

Handing Cyber Keys to the EnemyMat Kordell | Chief Operating Officer | CyberStreams
Published on: 06/10/2025

Let’s unpack this like a leaked blueprint, in plain English. Microsoft’s Microsoft Active Protections Program (MAPP) was designed with good intentions: give trusted security partners, like antivirus vendors, early access to intel on software vulnerabilities, so they can prepare defenses before attackers can exploit them. The goal? Shrink the so-called “zero-day” vulnerability window from months to mere minutes.

System Updates
The Pentagon Dodges a Bullet and Microsoft Leaves The Gun Loaded

The Pentagon Dodges a Bullet and Microsoft Leaves The Gun Loaded

The Pentagon Dodges a Bullet and Microsoft Leaves The Gun LoadedMat Kordell | Chief Operating Officer | CyberStreams
Published on: 05/10/2025

In May 2025, under the fluorescent lights of a Berlin conference hall, the world’s top ethical hackers gathered for Pwn2Own, an annual competition that often forecasts tomorrow’s cyber threats. Among them, a researcher from Viettel made headlines by breaching Microsoft's on-premises SharePoint server, a legacy system still widely used by businesses for internal file sharing.

System Updates