Month: June 2025

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Severe WebDAV vulnerability

Cybersecurity Threat Advisory: Severe WebDAV vulnerability

Microsoft has disclosed a serious zero-day vulnerability in the Web Distributed Authoring and Versioning (WebDAV) protocol, identified as CVE-2025-33053, with a CVSS score of 8.8. Actively exploited by the Stealth Falcon APT group, this vulnerability enables remote code execution (RCE)...

/ June 30, 2025
Barracuda Managed Vulnerability Security
Close hidden security gaps with Barracuda Managed Vulnerability Security

Close hidden security gaps with Barracuda Managed Vulnerability Security

We are excited to announce the launch of Barracuda Managed Vulnerability Security. This is a fully managed vulnerability scanning service that extends the BarracudaONE platform and is backed by Barracuda’s global, award-winning security operations center (SOC). Barracuda Managed Vulnerability Security scans for...

/ June 30, 2025
Tech Time Warp
Tech Time Warp: 25 years of exploiting poor Pikachu

Tech Time Warp: 25 years of exploiting poor Pikachu

One of the first pieces of malware designed to target children turns 25 this month. Take a look back in this edition of Tech Time Warp. First detected in June 2000, the Pikachu Pokémon or “Pokey” virus played on a...

/ June 27, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix Gateway vulnerability

Cybersecurity Threat Advisory: Citrix Gateway vulnerability

Citrix has issued emergency patches for a critical memory overflow flaw that impacts NetScaler ADC and Gateway. Exploitation can lead to denial-of-service (DoS) and system control issues. Review this Cybersecurity Threat Advisory for guidance on protecting your systems against this...

/ June 26, 2025
Navigating the landscape: KPMG reveals the key insights for MSPs

Navigating the landscape: KPMG reveals the key insights for MSPs

A new KPMG report highlights key insights into the evolution of the MSP landscape. There were key seven emerging trends and five universal challenges that are reshaping the industry. Emerging priorities for modern MSPs As the IT landscape continues to...

/ June 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Global Microsoft Exchange attack

Cybersecurity Threat Advisory: Global Microsoft Exchange attack

A recent cyber campaign has compromised over 70 Microsoft Exchange servers across 26 countries by injecting JavaScript-based keyloggers into Outlook Web Access (OWA) login pages. Review the details of this Cybersecurity Threat Advisory to safeguard against these vulnerabilities. What is...

/ June 25, 2025
Building client trust: Strategies to prove security and compliance

Building client trust: Strategies to prove security and compliance

Client trust is one of the most valuable assets a managed service provider (MSP) can earn. As clients become more informed about cybersecurity and more cautious in choosing their providers, it’s no longer enough to say you’re secured – you...

/ June 25, 2025
LLMs
Unmasking the next wave: LLMs and evolving cyberthreats

Unmasking the next wave: LLMs and evolving cyberthreats

This week, we bring you additional interviews with experts on the cybersecurity dangers posed by large language models (LLMs) such as Claude, DeepSeek, and ChatGPT. With the rapid rise in the use of these services comes an increasing set of...

/ June 24, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities in Linux distributions

Cybersecurity Threat Advisory: Vulnerabilities in Linux distributions

Two critical local privilege escalation (LPE) vulnerabilities were disclosed, identified as CVE-2025-6018 and CVE-2025-6019. These vulnerabilities affect all versions of SUSE 15 and libblockdev, two major Linux distributions, allowing unprivileged users to escalate their privileges to root and posing significant...

/ June 24, 2025
Threat Spotlight: Half the spam in your inbox is generated by AI

Threat Spotlight: Half the spam in your inbox is generated by AI

Cyber attackers are leveraging the power of artificial intelligence (AI) to boost their chances of success in email-based attacks. AI tools can help them to develop and launch more attacks, more frequently, and to make these attacks more evasive, convincing,...

/ June 23, 2025 / 6 Comments