Month: March 2025

Email Threat Radar – March 2025

Email Threat Radar – March 2025

Over the last month, Barracuda threat analysts identified several notable email-based threats targeting organizations around the world, including: Extortion attempts impersonating Clop ransomware New attacks by the evasive and highly adaptive LogoKit phishing platform A phishing campaign leveraging SVG image file attachments Attackers...

/ March 17, 2025 / 7 Comments
Pioneers in Tech
Pioneers in Tech: Margaret Hamilton sends man to the moon

Pioneers in Tech: Margaret Hamilton sends man to the moon

The photo is iconic: A young woman stands next to almost 20 bound books, the stack of books nearly as tall as her (though she appears to have a slight heel in the shoes complementing her very 1960s shift dress)....

/ March 14, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: EOL Juniper Networks MX routers targeted in attacks

Cybersecurity Threat Advisory: EOL Juniper Networks MX routers targeted in attacks

Threat actor UNC3886 has been observed targeting end-of-life (EOL) MX routers from Juniper Networks as part of a sophisticated campaign designed to deploy custom backdoors. This group has demonstrated a particular focus on internal networking infrastructure, which allows them to...

/ March 13, 2025
Cloud marketplace
The rise of cloud marketplaces: What’s fueling the growth?

The rise of cloud marketplaces: What’s fueling the growth?

According to a 2025 Key Issues and Prediction Report from The Futurum Group, more than a third of all deals moving through cloud marketplaces now involve some type of channel partner. Alex Smith is vice president and practice lead for...

/ March 13, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Moxa fixes severe authentication flaws

Cybersecurity Threat Advisory: Moxa fixes severe authentication flaws

Moxa has issued a security advisory highlighting critical authorization vulnerabilities in several switch models, tracked as CVE-2024-12297, with a CVSS score of 9.2. Review the details of this Cybersecurity Threat Advisory to understand how to mitigate the impact of authentication...

/ March 13, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability within TP-Link routers

Cybersecurity Threat Advisory: Vulnerability within TP-Link routers

A vulnerability that could lead to critical status, tracked as CVE-2023-1389, was identified in TP-Link Archer AX-21 routers. The Ballista botnet is currently exploiting this vulnerability, which can spread automatically across the web. Continue reading this Cybersecurity Threat Advisory to...

/ March 12, 2025
Cybersecurity Skills Gap
Closing the cybersecurity skills gap: How MSPs can rescue businesses

Closing the cybersecurity skills gap: How MSPs can rescue businesses

Cybersecurity threats are growing in frequency and sophistication, and organizations industrywide are grappling with a critical shortage of skilled cybersecurity professionals to defend against them. A World Economic Forum report reveals that the cybersecurity skills gap widened by 8 percent last...

/ March 12, 2025
internal compliance
The power of internal compliance: Driving growth, trust, & efficiency for MSPs

The power of internal compliance: Driving growth, trust, & efficiency for MSPs

For managed service providers (MSPs), internal compliance isn’t just about checking boxes; it’s about building credibility, mitigating risks, and creating a strong foundation for business growth. Our previous blog explored how MSPs can help their clients navigate the complex world...

/ March 12, 2025
cyber risks
Proactive strategies for MSPs to tackle cross-border cyber risks

Proactive strategies for MSPs to tackle cross-border cyber risks

Cyber risks that begin in one place tend to spread worldwide. This means managed service providers (MSPs) must look beyond their clients’ cubicles to see what is going on in other parts of the world so they are not caught...

/ March 11, 2025
Medusa ransomware and its cybercrime ecosystem

Medusa ransomware and its cybercrime ecosystem

Greek mythology says the Medusa was once a beautiful woman until Athena’s curse transformed her into a winged creature with a head full of snakes. Because of her power to petrify anyone who looked directly upon her face, she is...

/ March 10, 2025