Welcome to EdgeTeam’s update! We’re excited to bring you the latest insights and updates from across the region. As your trusted IT partner, we’re here to support you every step of the way in adopting and implementing the latest technology. We hope this roundup of resources helps keep you and your team ahead of the curve and informed on the innovations that matter most.


The Latest Story in Tech

In a new twist on phishing scams, attackers are exploiting Docusign’s “Envelopes: create API” to inundate corporate inboxes with fake invoices. By leveraging a paid Docusign account, cybercriminals create highly convincing invoice templates, making the emails appear as authentic requests to e-sign documents, often from trusted brands like Norton Antivirus. This unusual attack vector has successfully bypassed traditional email security measures, making it harder for users to detect the threat.

Why Does This Matter?

This attack is a stark reminder of the evolving tactics cybercriminals use to exploit legitimate tools for fraud. With API abuse on the rise, it’s essential to understand the potential vulnerabilities even trusted services can present. The direct API-generated emails appear legitimate, bypassing phishing filters and capitalizing on users’ familiarity with the Docusign brand, which has over a billion users worldwide.

What Should You Consider?

  1. Always double-check the source of document-signing requests, even from trusted brands, and implement internal verification steps for invoices.
  2. Educate teams on spotting unexpected or unusually formatted requests, including those with uncommon charges or fees.
  3. If you’re using APIs in your systems, conduct regular threat modeling exercises to identify and mitigate potential abuse points, and consider rate limiting sensitive API endpoints to prevent mass exploitation.

As technology continues to advance, it’s important to stay informed about the trends shaping the future of IT.

Top Trends – Zero Trust

  • Effective Zero Trust in the cloud starts with Identity and Access Management. Too often, organizations mistakenly leave services publicly accessible, creating potential vulnerabilities. By using IAM with minimum privilege settings and activating security features, companies can restrict access, reducing risks associated with open cloud environments.
  • At DoDIIS 2024, leaders emphasized that operationalizing cyber defense alongside zero trust is key to tackling today’s cyber challenges. Using AI to monitor and respond to unusual activity enables quicker threat responses, while zero trust policies reinforce data-centric protections. This combination enhances readiness across government cybersecurity networks.
  • A new federal zero-trust guide, developed by CDO and CISO councils, highlights best practices for data security. By covering data classification, protection measures, and threat response, the guide supports federal agencies in updating their zero-trust frameworks to enhance security around sensitive public data.

EdgeTeam’s Roundup

Here, we’ll keep you informed on the key developments in IT infrastructure, security, and cloud solutions. Whether it’s optimizing networks in underserved areas or delivering innovative solutions to keep your systems secure, this section is dedicated to help you stay ahead.

  • By focusing on high-risk users, companies can dramatically reduce threats and streamline tool use. This hands-on approach, inspired by healthcare training, encourages executives and other high-risk individuals to recognize, understand, and mitigate their cybersecurity risks, thus building a more resilient organization.
  • To combat credential theft, Google Cloud is rolling out mandatory MFA for all users by 2025. This phased approach begins now, with information for administrators, followed by full enforcement for all password-based logins and federated users by the end of 2025.
  • Mitsubishi Electric and Rockwell Automation have revealed critical vulnerabilities that expose factory systems to remote code execution, denial-of-service (DoS), and data tampering. The CISA advises manufacturers to apply recommended patches immediately, as cyberattacks on industrial control systems continue to increase, especially from state-sponsored groups.
  • A former Disney employee allegedly abused his credentials to alter allergen warnings in Disney’s menu app, posing a serious risk for allergy sufferers. After being terminated, he reportedly used unauthorized access to modify menus, including removing peanut allergy notices. Fortunately, Disney caught the issue before any affected menus were distributed.
  • The National Cybersecurity Strategy 2.0 report and recent EPA guidance mark updates in critical infrastructure protection. With enhanced incident response protocols and new AI initiatives, sectors like energy and water are better equipped to handle escalating cyber threats.

Partner Spotlight: Juniper Networks

Strong Cloud Demand

Juniper Networks outperformed Wall Street expectations in Q3, with $1.33 billion in revenue fueled by increased demand from cloud firms investing in AI infrastructure. The recent acquisition by Hewlett Packard Enterprise signals further growth as Juniper continues to support AI-driven networking needs.

AI-Powered Network Upgrade

Thai Airways has partnered with Juniper Networks to upgrade its headquarters’ network infrastructure with Juniper’s AI-Native Networking Platform, including Wi-Fi 6E access points and Mist AI. This modernization reduces troubleshooting needs by up to 90% and ensures reliable connectivity for passengers and staff.

Join their demo to see how Juniper’s Mist AI can eliminate up to 90% of network trouble tickets—discover AI-native networking in action!


Employee Headlights

Meet Colby Strange – our talented Graphic Design Coordinator at EdgeTeam Technology.

A graduate of Angelo State University, Colby brings a creative eye and fresh perspective to all things visual. Known for his knack for design and attention to detail, he ensures our brand looks sharp across every project.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *