Month: September 2024

pioneers in tech
Pioneers in Tech: Dorothy Vaughn, one of the women of Apollo

Pioneers in Tech: Dorothy Vaughn, one of the women of Apollo

The woman who became NASA’s first Black manager was honored in July with the renaming of a central building at the Johnson Space Center in Houston. Learn all about her trailblazing career in this edition of Pioneers in Tech! On...

/ September 13, 2024
content creation phishing
Content creation platforms leveraged for phishing attacks

Content creation platforms leveraged for phishing attacks

Cybersecurity is an ever-evolving field, and as new solutions are introduced to better detect and defend against cyberthreats, attackers in turn need to adapt their tactics to try and evade those solutions. For example, Barracuda threat analysts have recently identified...

/ September 12, 2024
MSP industry
Ask an MSP Expert: Secrets to thriving in a fast-changing industry

Ask an MSP Expert: Secrets to thriving in a fast-changing industry

Staying ahead of the rapidly evolving cyber threat landscape requires more than just technological prowess from a managed service providers (MSP). It demands a deep understanding of industry dynamics, and a robust network built off trust and collaboration. In the...

/ September 11, 2024
generative AI
How CISOs can leverage generative AI to improve email, application security

How CISOs can leverage generative AI to improve email, application security

In an era where digital threats evolve at an unprecedented pace, the integration of generative AI into cybersecurity operations has become essential. From content creation to behavior prediction and knowledge articulation, generative AI is reshaping the landscape of security practices, offering immense...

/ September 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup security flaws

Cybersecurity Threat Advisory: Veeam Backup security flaws

There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...

/ September 10, 2024
cyber risk
Summer Roundup: Cyber risks for MSPs to monitor

Summer Roundup: Cyber risks for MSPs to monitor

As summer begins its swan song and thoughts begin to turn toward autumn, the Cybersecurity and Infrastructure Security Agency (CISA) has a fresh batch of advisories. Released in August, these advisories highlight the various cyber risks lurking out there, many...

/ September 10, 2024
generative AI
Generative AI inference engines create MSP opportunities

Generative AI inference engines create MSP opportunities

More organizations are beginning to operationalize generative artificial intelligence (AI). Along with this, many of them will be looking to managed service providers (MSPs) to help them optimally deploy the inference engines that are needed to analyze data in production...

/ September 9, 2024
Tech Time Warp
Tech Time Warp: Back to school and back to hacks

Tech Time Warp: Back to school and back to hacks

Now that we are past Labor Day, school is back in session across the United States—which means summer vacation is over for cybercriminals, too. Let’s dive into this week’s edition of Tech Time Warp. The education sector is increasingly a...

/ September 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cicada3301 ransomware variant

Cybersecurity Threat Advisory: Cicada3301 ransomware variant

A new ransomware variant has been found, known as Cicada3301. It exhibits similarities to the defunct BlackCat (ALPHV) operation, and it targets both Windows and Linux systems. Review the details in this Cybersecurity Threat Advisory to learn how this variant...

/ September 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Chrome zero-day vulnerability

Cybersecurity Threat Advisory: Chrome zero-day vulnerability

A critical zero-day vulnerability in Chrome has been identified, allowing unauthorized access and potential remote code execution on affected systems. Continue reading this Cybersecurity Threat Advisory for more information and to safeguard your systems now. What is the threat? The...

/ September 5, 2024