Month: July 2020

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix Vulnerabilities Affecting ADC, Gateway, and SD-WAN

Cybersecurity Threat Advisory: Citrix Vulnerabilities Affecting ADC, Gateway, and SD-WAN

Advisory Overview Citrix has issued a security patch for multiple gateway devices that were found to have security flaws. These security issues are reportedly unrelated to the previously released CVE-2019-19781. SKOUT advises updating any affected devices to the latest version....

/ July 10, 2020
Pioneers in Tech: Katherine Johnson, no longer a hidden figure

Pioneers in Tech: Katherine Johnson, no longer a hidden figure

The movie “Hidden Figures” introduced the masses to Katherine Johnson, but it only scratched the surface of this fascinating and influential woman’s life. Played by Taraji P. Henson in the 2016 film, Johnson broke barriers throughout her life and played...

/ July 10, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Spear-Phishing Campaign Spreading Hakbit Ransomware

Cybersecurity Threat Advisory: Spear-Phishing Campaign Spreading Hakbit Ransomware

Advisory Overview A spear-phishing campaign targeting various industries is utilizing malicious Microsoft Excel attachments to infect users with the “GuLoader” backdoor trojan. The threat actors then proceed to use GuLoader to download “Hakbit” ransomware onto the infected device. Recommendations to...

/ July 9, 2020
Summer cybersecurity dangers

Summer cybersecurity dangers

In simpler times, some businesses would literally hang a sign on their door each summer saying “Gone Fishin’” and close for two weeks. In today’s world, hackers might as well hang a sign on their door in summer that says...

/ July 9, 2020
Shift to the cloud creates additional IT complexities

Shift to the cloud creates additional IT complexities

In the wake of the COVID-19 pandemic, it’s clear that more applications will be moving into the cloud at a faster rate than ever. In general, organizations now have a much greater appreciation for IT flexibility and application resiliency. In...

/ July 8, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: F5 Critical Vulnerability Exploited in Wild (CVE-2020-5902)

Cybersecurity Threat Advisory: F5 Critical Vulnerability Exploited in Wild (CVE-2020-5902)

Advisory Overview A Remote Code Execution (RCE) vulnerability exists in the BIG-IP application delivery controller (ADC) software’s Traffic Management User Interface (TMUI). The vulnerability could allow an attacker to execute remote commands or arbitrary code without the need for authentication,...

/ July 7, 2020
Why you need to document your MSP business NOW

Why you need to document your MSP business NOW

What would you say is the most crucial aspect of being able to grow your IT Solution Provider or Managed Service Provider (MSP) business? Marketing? For sure. You can be the best IT company in the world, but if nobody...

/ July 7, 2020 / 4 Comments
Ask an MSP Expert: MSPs prepare for return to normal

Ask an MSP Expert: MSPs prepare for return to normal

Q: Many of my clients are beginning to let their employees and end-users return to their establishments, as local government restrictions are slowly removed. As the ‘return to normal’ slowly progresses, how can my MSP business best prepare for this...

/ July 6, 2020
Whirlwind project MIT
Tech Time Warp: A Technological Whirlwind at MIT

Tech Time Warp: A Technological Whirlwind at MIT

July 4, 1956, doesn’t quite rank with July 4, 1776, in terms of independence, but it was a remarkable day in terms of freedom for computer users—freedom from punch cards, dials, and switches, that is. On July 4, 1956, researchers...

/ July 3, 2020 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ripple20 Vulnerabilities

Cybersecurity Threat Advisory: Ripple20 Vulnerabilities

Advisory Overview A series of nineteen vulnerabilities dubbed “Ripple20” have been identified in a large number of devices spanning multiple vendors and industries involving a widely used low-level TCP/IP software library developed by Treck, Inc. Exploited devices risk remote code...

/ July 2, 2020