Month: June 2021
Cybersecurity Threat Advisory: Wormable Ransomware Targeting Linux and Docker instances
Threat Update A new ransomware built in Bash has been discovered targeting Linux and Docker cloud containers. This malware is built in Bash and has been given the name “DarkRadiation”. There is no currently known information about the delivery methods...
USB flash drives and their cybersecurity dangers
As cloud storage has grown in popularity, the use of USB flash drives has declined in many settings. The decline in popularity of USB flash drives, however, hasn’t necessarily diminished their threat, as they are still a common tool in some...
Cybersecurity Threat Advisory: Critical XXE Vulnerability Discovered in ConnectWise Automate
Threat Update This month, it was discovered that ConnectWise Automate versions 2021.6.131 and prior are vulnerable to exploits that allow threat actors to remotely execute code and access confidential data by performing XML external entity (XXE) injection attacks. The severity...
Podcast: Celebrating Global MSP Day 2021, Episode 6
In our most recent episode, the SmarterMSP Podcast hosted experienced MSP manager Paul Rainey and Mark Whiffen of Barracuda MSP, as they shared their insights on the significant cybersecurity protection monitoring and management (RMM) tool can provide vital cybersecurity protection...
Ask an MSP Expert: Why should we replace our VPN with ZTNA?
Q: With the sudden mass shift to remote working in response to the pandemic, my MSP business set up VPN configurations for each of our clients to meet their connectivity needs. What advantages does ZTNA offer that make it worth...
Tech Time Warp: The Pikachu virus is not your friend
It sounds so innocent: An email appears in your inbox, subject line “Pikachu Pokemon.” The message speaks of friendship and invites you to visit Pikachu on his website. And the attachment (warning bells going off yet?) features an animation of...
Organizations need MSPs to become cloud security heroes
When not done right, cloud security can become a bit of a mess. Misconfigurations of cloud services are more widespread than ever at a time when cybercriminals have tools that enable them to discover vulnerabilities in a matter of minutes....
Cybersecurity Threat Advisory: Botnets Version Hunting Perimeter Devices
Threat Update Threat actors have been seen in the wild scanning for perimeter devices which are running vulnerable firmware and have not been updated to allow for vulnerabilities to be patched. Perimeter devices (such as firewalls, intrusion detection/prevention systems, and...
Summer break for schools means homework for MSPs
Campuses are quiet, school buses gather dust in maintenance garages, and students visit swimming holes and flip burgers. But while teachers and students can soak in the solace of summer vacation, hackers are not taking a break. School networks are...
Cybersecurity Threat Advisory: ThroughTek P2P Supply Chain Vulnerability
Threat Update ThroughTek, a massive original equipment manufacturer (OEM) supplier, has been made aware of a software vulnerability involving the IP cameras with P2P connections. The vulnerability could potentially allow unauthorized access to sensitive information via camera audio/video feeds. SKOUT...