Month: July 2020
Cybersecurity Threat Advisory: Citrix Vulnerabilities Affecting ADC, Gateway, and SD-WAN
Advisory Overview Citrix has issued a security patch for multiple gateway devices that were found to have security flaws. These security issues are reportedly unrelated to the previously released CVE-2019-19781. SKOUT advises updating any affected devices to the latest version....
Pioneers in Tech: Katherine Johnson, no longer a hidden figure
The movie “Hidden Figures” introduced the masses to Katherine Johnson, but it only scratched the surface of this fascinating and influential woman’s life. Played by Taraji P. Henson in the 2016 film, Johnson broke barriers throughout her life and played...
Cybersecurity Threat Advisory: Spear-Phishing Campaign Spreading Hakbit Ransomware
Advisory Overview A spear-phishing campaign targeting various industries is utilizing malicious Microsoft Excel attachments to infect users with the “GuLoader” backdoor trojan. The threat actors then proceed to use GuLoader to download “Hakbit” ransomware onto the infected device. Recommendations to...
Summer cybersecurity dangers
In simpler times, some businesses would literally hang a sign on their door each summer saying “Gone Fishin’” and close for two weeks. In today’s world, hackers might as well hang a sign on their door in summer that says...
Shift to the cloud creates additional IT complexities
In the wake of the COVID-19 pandemic, it’s clear that more applications will be moving into the cloud at a faster rate than ever. In general, organizations now have a much greater appreciation for IT flexibility and application resiliency. In...
Cybersecurity Threat Advisory: F5 Critical Vulnerability Exploited in Wild (CVE-2020-5902)
Advisory Overview A Remote Code Execution (RCE) vulnerability exists in the BIG-IP application delivery controller (ADC) software’s Traffic Management User Interface (TMUI). The vulnerability could allow an attacker to execute remote commands or arbitrary code without the need for authentication,...
Why you need to document your MSP business NOW
What would you say is the most crucial aspect of being able to grow your IT Solution Provider or Managed Service Provider (MSP) business? Marketing? For sure. You can be the best IT company in the world, but if nobody...
Ask an MSP Expert: MSPs prepare for return to normal
Q: Many of my clients are beginning to let their employees and end-users return to their establishments, as local government restrictions are slowly removed. As the ‘return to normal’ slowly progresses, how can my MSP business best prepare for this...
Tech Time Warp: A Technological Whirlwind at MIT
July 4, 1956, doesn’t quite rank with July 4, 1776, in terms of independence, but it was a remarkable day in terms of freedom for computer users—freedom from punch cards, dials, and switches, that is. On July 4, 1956, researchers...
Cybersecurity Threat Advisory: Ripple20 Vulnerabilities
Advisory Overview A series of nineteen vulnerabilities dubbed “Ripple20” have been identified in a large number of devices spanning multiple vendors and industries involving a widely used low-level TCP/IP software library developed by Treck, Inc. Exploited devices risk remote code...