Month: January 2025

Cybersecurity Threat Advisory: MintsLoader campaign threat
A cyber campaign has been identified using the MintsLoader malware loader to deliver secondary payloads, such as the StealC information stealer and the legitimate open-source network computing platform, BOINC. This campaign has primarily targeted sectors such as electricity, oil and...

Tech Time Warp: Java programming language is a thirtysomething
The programming language that made “Write Once, Read Anywhere” (WORA) a standard turns 34 this year (or 30, depending on which anniversary you’re counting). Learn about the history behind Java programming language in this edition of Tech Time Warp. The...

Cloud computing expertise in high demand for 2025
Despite the spike in demand for cloud computing services in 2024, consumption is expected to increase further as organizations head into 2025. This growth is mainly driven by the rise of artificial intelligence (AI) applications. A report from Synergy Research...

Cybersecurity Threat Advisory: Ransomware attacks on ESXi systems
New ransomware attacks were discovered targeting ESXi systems that use stealthy SSH tunnels to direct traffic to command-and-control (C2) infrastructure, enabling attackers to remain undetected. Continue reading this Cybersecurity Threat Advisory to discover the key steps to safeguard your environment....

WFH, RTO, Hybrid – What’s best for MSPs?
The pandemic drove employers to allow and enable broad-scale work from home (WFH). Now, as the impact of COVID-19 dissipates, some employers are insisting on a return to office (RTO). This has not gone down well with all employees –...

Cybersecurity Threat Advisory: Apple iOS zero-day vulnerability
Apple has released critical security updates to address an actively exploited zero-day vulnerability, tracked as CVE-2025-24085. Continue reading this Cybersecurity Threat Advisory in full to learn what devices are affected and how you can mitigate your risk regarding this vulnerability....

Proven strategies for MSPs selling cybersecurity
Small and medium-sized enterprises (SMEs) are just as vulnerable to cyberattacks as a Fortune 500 company. According to the U.S. Chamber, a majority (60 percent) of small businesses say cybersecurity threats, including phishing, malware, and ransomware, are a top concern....

Cybersecurity Threat Advisory: Fortinet authentication vulnerability
A critical Fortinet authentication bypass vulnerability, CVE-2024-55591, is actively exploited in the wild. This vulnerability impacts FortiOS and FortiProxy, with a CVSS score of 9.6. Continue reading this Cybersecurity Threat Advisory to learn the necessary steps to protect your environment....