Month: June 2023
Tech Time Warp: Malware in the “Form” of a boot sector virus
Although this week’s Tech Time Warp topic is not as prevalent today, boot sector viruses were a widespread issue in the 1990s and 2000s. Especially common during the days of MS-DOS and floppy disks, a boot sector virus attacks a...
Making security pay
Service providers often struggle financially, even when their business is growing, because it can be challenging to achieve and maintain profitability. MSPs have seen success by adding security services to their offering to offset this challenge. However, security needs vary...
Survey shows strong need for external cloud expertise
A global survey of 1,000 technology practitioners and decision-makers conducted by Forrester Consulting on behalf of HashiCorp finds 43 percent plan to work more strategically with systems integrators, resellers, and consultants, to better manage their cloud computing environments. There is...
Cybersecurity view from an artificial intelligence optimist
2023 has been the year of generative AI. Will it transform cybersecurity as we know it? Or will the status quo prevail as a continual cat-and-mouse game between the cyber-good and the cyber-bad? SmarterMSP is talking to a variety of...
Cybersecurity Threat Advisory: New FortiNAC critical vulnerability update released
A critical remote code execution vulnerability (CVE-2023-33299) with a CVSS score of 9.6 has been discovered in Fortinet’s FortiNAC product. This vulnerability poses a significant risk as it could allow an unauthenticated user to execute unauthorized code or commands by...
Cybersecurity Threat Advisory: Command injection flaw in Zyxel NAS devices
Zyxel, a networking equipment manufacturer, has released urgent security updates to address critical vulnerabilities in their network-attached storage devices. CVE-2023-27992 (CVSS score: 9.8) has been declared as a pre-authentication command injection vulnerability. What is the threat? The threat involves multiple vulnerabilities...
Threat Spotlight: Attackers use 15-year-old tactics to target security flaws
Attackers are quick to exploit new opportunities for attack. The reporting of the Log4J bug in December 2021, for example, is believed to have led to a 150% increase in exploit activity the following year. However, an analysis of Barracuda’s threat detection...
Tech Time Warp: 80s viruses that hit the Apple II
Apple products have a reputation for being immune to malware, but that is not 100 percent true. In 1988, hackers released two viruses targeting ProDOS, the Apple II operating system. Admittedly, it took hackers five years to attack ProDOS —...
Cybersecurity Threat Advisory: New custom malware discovered
Researchers have uncovered a year-long, highly targeted cyber-attack utilizing custom malware called RDStealer. The bespoke malware campaign against an East Asian IT company has been active for more than a year with the intent to compromise credentials and exfiltrating data....
The MSP’s guide to services pricing
For managed service providers (MSPs), it’s obvious that pricing is important. Prospects will generally only pay the going market rate, typically driven by your competition’s offering. As such, you must be careful in how you price your service offerings. For...