Blog - Hexafusion Blog | Hexafusion
  • Contact Us At

    Vancouver: 604-757-2010

         Toronto: 416-236-6300

  • E-Mail Us @


Hexafusion Blog

Hexafusion management team has been serving businesses in Canada and the United States since 2014, providing IT Services such as IT support, IT security, computer support and consulting to small and medium-sized businesses.

Expanding the Horizon: Microsoft Introduces AI-Powered Copilot for Word, Outlook, and More



The era of AI-driven tools and technologies continues to expand, streamlining various aspects of our digital lives. Microsoft's AI-powered Copilot, initially designed as a coding assistant, is now taking a leap forward to make its mark on the broader productivity landscape. This article will explore the introduction of Microsoft's AI-Powered Copilot for Word, Outlook, and more, showcasing how this innovation will reshape the way we interact with these productivity tools.

Continue reading

Patch Tuesday March 2023 CVE Codes & Titles


In March 2023, Microsoft released its Patch Tuesday update, which addressed 80 vulnerabilities, including 9 critical ones. These vulnerabilities span a wide range of Microsoft products and services, from Microsoft Outlook to Windows Server.

One of the most pressing vulnerabilities in this release is in Microsoft Outlook, with CVE-2023-23397 already being exploited. External attackers could send specially crafted emails to leak Net-NTLMv2 hash information of the victim to the attacker. Microsoft recommends updating the system as soon as possible to prevent further exploitation of this vulnerability.

Continue reading

How Technological Innovations Help Optimize Business

There are many causes of business failure, and it takes a lot of hard work to make your business a success. Fortunately, there are numerous technological innovations that can help you optimize your business. 
Continue reading

Reminder: IE 11 will be retired on June 15, 2022

IE 11 will be retired on June 15, 2022 IE 11 will be retired on June 15, 2022
As formerly announced, the future of Internet Explorer on Windows remains in Microsoft Edge. Internet Traveler setting (IE mode) gives heritage internet browser support within Microsoft Edge. Because of this, the IE11 desktop computer application will be retired on June 15, 2022, on particular variations of Windows 10. This means that the IE11 desktop computer application will certainly no longer be sustained and also will certainly be considerably redirected to Microsoft Edge over the following months, as well as inevitably impaired using Windows Update, to aid guarantee a smooth retirement.
Continue reading

Netflix Secret Codes Reveals Hidden Titles


How can I find hidden films on Netflix?

Netflix secrets codes provide the key to getting access to "hidden" movies and hard-to-find content. Knowing how to utilize Netflix codes will allow you to go straight to Netflix subcategories, and then quickly get to the place you'd like to be. Subcategories can be extremely specific. The closer to the exact category, the simpler your search is.

Continue reading

Microsoft Patch Tuesday – March 2022




Patch Tuesday is once again upon us. The March 2022 edition of Patch Tuesday brings us 72 fixes, with 3 rated as critical. We've listed the most important changes below.

Microsoft Exchange has been a recurring topic the last months with continuous problems and fixes being released. This month's patch Tuesday includes a critical fix for Microsoft Exchange for CVE-2022-23277. A remote code execution vulnerability with a CVSS base score of 8.8. According to Microsoft's exploitability assessment, this vulnerability's exploitability is more likely, so quick pathing is recommended.

Continue reading

NSA Releases Network Infrastructure Security Guidance


The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats. Recommendations include perimeter and internal network defenses to improve monitoring and access controls throughout the network.

Continue reading

CISA updates Conti ransomware alert with nearly 100 domain names

CISA updates Conti ransomware alert with almost 100 domain names

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated the alert on Conti ransomware with indicators of compromise (IoCs) consisting of close to 100 domain names used in malicious operations.

Continue reading

Who Can Fix Cloud Security Problems? Third-party Solution Providers, Study Finds

Misconfiguration is the most likely cause of a cloud security incident, cybersecurity professionals said in a new study, placing it far ahead of exposed data or account compromise.

Continue reading

Nearly 30% of critical WordPress plugin bugs don't get a patch


Patchstack, a leader in WordPress security and threat intelligence, has released a whitepaper to present the state of WordPress security in 2021, and the report paints a dire picture.

Continue reading

FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations


1 min read

The FBI issued a warning this week that the RagnarLocker ransomware has infected some 52 organizations in manufacturing, energy, financial services, government, and information technology so far this year. 

Continue reading

Microsoft tests new cloud-based Microsoft Defender for home users


Microsoft has announced that the company's new cloud-based Microsoft Defender security solution has entered preview for home customers in the United States.

Continue reading

Bitdefender Launches New Password Manager Solution for Consumers

BUCHAREST, Romania and SANTA CLARA, Calif., March 9, 2022 Bitdefender, a global cybersecurity leader, today launched Bitdefender Password Manager, a new consumer solution that simplifies the creation and management of secure passwords for all online accounts across multiple platforms including mobile.

Continue reading

The Cloud-Native Opportunity for Zero Trust

Zero trust is a historically loaded term — misunderstood and misused. Many vendors claim that zero trust is all about identity and access management. While that is certainly a building block, that definition is increasingly narrow as organizations moving to the cloud find themselves navigating greater challenges beyond defending the "perimeter."

Continue reading

Palo Alto Networks Introduces Prisma Cloud Supply Chain Security

SANTA CLARA, Calif., March 9, 2022 /PRNewswire/ -- With software supply chain attacks rising rapidly, Palo Alto Networks (NASDAQ: PANW) today announced Prisma® Cloud Supply Chain Security to provide a complete view of where potential vulnerabilities or misconfigurations exist in the software supply chain — allowing organizations to quickly trace to the source and fix them. If not quickly fixed or, better yet, avoided during coding, these security flaws could allow attackers to infiltrate systems, spread malicious payloads throughout an organization's software and access sensitive data.

Continue reading

Can MSSPs Mitigate Rising ICS, IOT Vulnerability Issues?

Vulnerabilities across industrial control systems (ICS) rose by 25 percent in the second half of 2021 and overall by 110 percent over the last four years, according to a new report.

Continue reading

10 Signs of a Poor Security Leader

Many businesses are concerned about attrition — and for good reason. Few fields feel this pressure more acutely than the security field. While companies cannot control the tight labor market, they can control some of the factors that cause employees to leave.

Continue reading

FBI Issues RagnarLocker Ransomware Compromise, Cyberattack Indicators

The Federal Bureau of Investigation (FBI) has issued a new Flash report detailing ransomware attacks by RagnarLocker, a hacking crew that goes after critical infrastructure installations.

Continue reading

5 Ways XDR Can Improve Operational Efficiency for MSPs

With today’s ever-changing threat landscape, it’s not enough for MSPs to protect their customers’ users and infrastructure with advanced security. Complex attacks require a prioritized view of threats across multiple organizations. On top of that, MSPs need a detection and response strategy that can provide increased effectiveness of threat investigation and a reduction in the time it takes to detect threats. The purpose behind XDR is to provide cross-layered threat detection and response. XDR collects and automatically correlates data across multiple security layers–email, endpoint, server and network– which means threats are detected faster.

Continue reading

Hackers fork open-source reverse tunneling tool for persistence


Security experts have spotted an interesting case of a suspected ransomware attack that employed custom-made tools typically used by APT (advanced persistent threat) groups.

Although no concrete connection between groups has been uncovered, the operational tactics, targeting scope, and malware customization capabilities signify a potential connection.

Continue reading

By accepting you will be accessing a service provided by a third-party external to

Customer Login

Contact us

Learn more about what Hexafusion can do for your business.

Vancouver:  604-757-2010
Toronto:  416-236-6300

250 - 997 Seymour Street
Vancouver, British Columbia V6B 3M1