Category: Security

evolution of cybersecurity
Evolution of cybersecurity: The rise of XDR in the 2020s

Evolution of cybersecurity: The rise of XDR in the 2020s

As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...

/ January 31, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

A massive data leak that includes information from several past breaches with a staggering 12 terabytes of data, covering at least 26 billion records, is available on the dark web. This breach involved user data from platforms such as LinkedIn,...

/ January 30, 2024
Drones: Flying security opportunities for MSPs

Drones: Flying security opportunities for MSPs

As they continue to grow in popularity, drones are increasingly being included in managed service providers’ (MSPs) hardware and software management packages. For most MSPs, this is a natural extension, as drones are becoming more widely used in commercial applications,...

/ January 25, 2024 / 1 Comment
5 security predictions for 2024 from Barracuda executives

5 security predictions for 2024 from Barracuda executives

Over the past 12 months, we’ve seen threat actors use generative AI to take threats to new levels, scaling up their attacks and making them more effective. As 2024 gets underway, we’re looking ahead to the changes, developments, and trends...

/ January 25, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: NTLM password hash leaks

Cybersecurity Threat Advisory: NTLM password hash leaks

This Cybersecurity Threat Advisory highlights a new Microsoft vulnerability that attackers are actively exploiting to steal NTLM (NT LAN Manager) hashes. Read the full article to learn the severity of the threat and recommendations to mitigate the organization’s risks. What...

/ January 24, 2024
As hackers become more proficient, organizations face devastating financial consequences

As hackers become more proficient, organizations face devastating financial consequences

In a turbulent and uncertain economy, it is more important than ever to have a strong cybersecurity strategy that mitigates risks to data and the balance sheet. Ponemon Institute’s study on cybernomics, sponsored by Barracuda, reveals the potential serious financial...

/ January 24, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability

Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability

A critical Atlassian Confluence template injection vulnerability has been identified. It affects all outdated versions of Confluence Data Center and Server, allowing unauthenticated attackers to achieve remote code execution (RCE). Read this Cybersecurity Threat Advisory in detail to learn about...

/ January 23, 2024
Opportunities arise for MSPs despite skills shortages

Opportunities arise for MSPs despite skills shortages

A survey of 2,740 IT decision-makers conducted by Skillsoft, finds only 16 percent plan to rely more on third parties for support despite ongoing skills shortages. Instead, a full 45 percent plan to invest in more training for their existing...

/ January 18, 2024
The three email threat types that are hardest for users to detect

The three email threat types that are hardest for users to detect

There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...

/ January 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Unity Connection vulnerability

Cybersecurity Threat Advisory: Cisco Unity Connection vulnerability

A new Cisco Unity Connection vulnerability, designated as CVE-2024-20272, has been discovered which poses a significant risk to organizations utilizing Cisco Unity Connection. Read this Cybersecurity Threat Advisory in detail to learn about the vulnerability and how to secure your...

/ January 17, 2024