Category: Security
Evolution of cybersecurity: The rise of XDR in the 2020s
As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...
Cybersecurity Threat Advisory: The mother of all breaches (MOAB)
A massive data leak that includes information from several past breaches with a staggering 12 terabytes of data, covering at least 26 billion records, is available on the dark web. This breach involved user data from platforms such as LinkedIn,...
Drones: Flying security opportunities for MSPs
As they continue to grow in popularity, drones are increasingly being included in managed service providers’ (MSPs) hardware and software management packages. For most MSPs, this is a natural extension, as drones are becoming more widely used in commercial applications,...
5 security predictions for 2024 from Barracuda executives
Over the past 12 months, we’ve seen threat actors use generative AI to take threats to new levels, scaling up their attacks and making them more effective. As 2024 gets underway, we’re looking ahead to the changes, developments, and trends...
Cybersecurity Threat Advisory: NTLM password hash leaks
This Cybersecurity Threat Advisory highlights a new Microsoft vulnerability that attackers are actively exploiting to steal NTLM (NT LAN Manager) hashes. Read the full article to learn the severity of the threat and recommendations to mitigate the organization’s risks. What...
Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability
A critical Atlassian Confluence template injection vulnerability has been identified. It affects all outdated versions of Confluence Data Center and Server, allowing unauthenticated attackers to achieve remote code execution (RCE). Read this Cybersecurity Threat Advisory in detail to learn about...
Opportunities arise for MSPs despite skills shortages
A survey of 2,740 IT decision-makers conducted by Skillsoft, finds only 16 percent plan to rely more on third parties for support despite ongoing skills shortages. Instead, a full 45 percent plan to invest in more training for their existing...
The three email threat types that are hardest for users to detect
There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...
Cybersecurity Threat Advisory: Cisco Unity Connection vulnerability
A new Cisco Unity Connection vulnerability, designated as CVE-2024-20272, has been discovered which poses a significant risk to organizations utilizing Cisco Unity Connection. Read this Cybersecurity Threat Advisory in detail to learn about the vulnerability and how to secure your...