Month: June 2021

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Wormable Ransomware Targeting Linux and Docker instances

Cybersecurity Threat Advisory: Wormable Ransomware Targeting Linux and Docker instances

Threat Update A new ransomware built in Bash has been discovered targeting Linux and Docker cloud containers. This malware is built in Bash and has been given the name “DarkRadiation”. There is no currently known information about the delivery methods...

/ June 30, 2021
USB flash drives and their cybersecurity dangers

USB flash drives and their cybersecurity dangers

As cloud storage has grown in popularity, the use of USB flash drives has declined in many settings. The decline in popularity of USB flash drives, however, hasn’t necessarily diminished their threat, as they are still a common tool in some...

/ June 30, 2021 / 2 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical XXE Vulnerability Discovered in ConnectWise Automate

Cybersecurity Threat Advisory: Critical XXE Vulnerability Discovered in ConnectWise Automate

Threat Update This month, it was discovered that ConnectWise Automate versions 2021.6.131 and prior are vulnerable to exploits that allow threat actors to remotely execute code and access confidential data by performing XML external entity (XXE) injection attacks. The severity...

/ June 29, 2021
Podcast: Celebrating Global MSP Day 2021, Episode 6

Podcast: Celebrating Global MSP Day 2021, Episode 6

In our most recent episode, the SmarterMSP Podcast hosted experienced MSP manager Paul Rainey and Mark Whiffen of Barracuda MSP, as they shared their insights on the significant cybersecurity protection monitoring and management (RMM) tool can provide vital cybersecurity protection...

/ June 29, 2021
Ask an MSP Expert: Why should we replace our VPN with ZTNA?

Ask an MSP Expert: Why should we replace our VPN with ZTNA?

Q: With the sudden mass shift to remote working in response to the pandemic, my MSP business set up VPN configurations for each of our clients to meet their connectivity needs. What advantages does ZTNA offer that make it worth...

/ June 28, 2021
Tech Time Warp
Tech Time Warp: The Pikachu virus is not your friend

Tech Time Warp: The Pikachu virus is not your friend

It sounds so innocent: An email appears in your inbox, subject line “Pikachu Pokemon.” The message speaks of friendship and invites you to visit Pikachu on his website. And the attachment (warning bells going off yet?) features an animation of...

/ June 25, 2021
Organizations need MSPs to become cloud security heroes

Organizations need MSPs to become cloud security heroes

When not done right, cloud security can become a bit of a mess. Misconfigurations of cloud services are more widespread than ever at a time when cybercriminals have tools that enable them to discover vulnerabilities in a matter of minutes....

/ June 24, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Botnets Version Hunting Perimeter Devices

Cybersecurity Threat Advisory: Botnets Version Hunting Perimeter Devices

Threat Update Threat actors have been seen in the wild scanning for perimeter devices which are running vulnerable firmware and have not been updated to allow for vulnerabilities to be patched. Perimeter devices (such as firewalls, intrusion detection/prevention systems, and...

/ June 24, 2021
Summer break for schools means homework for MSPs

Summer break for schools means homework for MSPs

Campuses are quiet, school buses gather dust in maintenance garages, and students visit swimming holes and flip burgers. But while teachers and students can soak in the solace of summer vacation, hackers are not taking a break. School networks are...

/ June 23, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ThroughTek P2P Supply Chain Vulnerability

Cybersecurity Threat Advisory: ThroughTek P2P Supply Chain Vulnerability

Threat Update ThroughTek, a massive original equipment manufacturer (OEM) supplier, has been made aware of a software vulnerability involving the IP cameras with P2P connections. The vulnerability could potentially allow unauthorized access to sensitive information via camera audio/video feeds. SKOUT...

/ June 22, 2021