Month: December 2024
Preparing your marketing foundation for 2025 success
As the year winds down, the lead-up to Christmas often brings a natural slowdown. For managed service providers (MSPs), this quieter period can be a perfect window to prepare for a successful takeoff in the new year. Rather than hitting...
Cybersecurity Threat Advisory: Ivanti CSA authentication bypass vulnerability
Ivanti has issued a warning about a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution, tracked as CVE-2024-11639. The vulnerability allows remote attackers to gain administrative privileges without authentication or user interaction, enabling them to bypass security...
Tech Time Warp: Happy Birthday to pioneer in tech, Grace Hopper
Admiral Grace Hopper, one of the most legendary early females in the computer industry, would have celebrated her 118th birthday on December 9. Born in New York City in 1906, Hopper built a career in the U.S. Navy and computer...
AWS updates creating new opportunities for partners
Amazon Web Services (AWS) now offers four additional security certifications to help solution providers drive the adoption of additional solutions in collaboration with technology alliance partners such as Barracuda Networks. Part of its Competency programs for security certifications include artificial...
Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels
An advanced persistent threat (APT) group, Stately Taurus, has been exploiting a vulnerability in Visual Studio Code (VSCode) tunnels to maintain persistent remote access in compromised systems. Review the details in this Cybersecurity Threat Advisory to secure your environment. What...
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise
The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...
Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability
A critical vulnerability, identified as CVE-2024-50623, has been discovered in Cleo’s file transfer software suite. This vulnerability allows attackers to exploit an unrestricted file upload and download flaw, potentially leading to remote code execution (RCE) on vulnerable systems. Continue reading...
’Tis the season to avoid holiday email scams
Beware of common holiday email scams. As the holidays approach, businesses are busier than ever, and cybercriminals know it. Along with cheer, joy, and giving, the holidays also bring an unfortunate surge in cyber scams. As businesses tackle everything from...
Tech Time Warp: Recording industry takes on file-sharing pioneer Napster
Twenty-five years ago, a generation of college students hit the jackpot when it came to music. They moved to college dormitories with ethernet connections just as Shawn Fanning and Sean Parker launched Napster, the first mainstream peer-to-peer file-sharing service. Or,...