Month: July 2025

Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer
Security researchers have uncovered a new attack method known as “FileFix,” which exploits Windows File Explorer to execute stealthy PowerShell commands. By abusing legitimate Windows functionality, attackers can run malicious code while evading traditional security controls. Read this Cybersecurity Threat...

Pioneers in Tech: The man behind Moore’s Law
July 18 marks the 57th anniversary of Intel’s incorporation—and as with any of the Silicon Valley juggernauts, the backstory of its founders is fascinating. Take Gordon Moore, who—along with Robert Noyce and Andy Grove—incorporated the microprocessor company in 1968 and...

Cybersecurity Threat Advisory: FortiWeb critical SQL injection vulnerability
A high-severity SQL injection vulnerability, CVE-2025-25257, in Fortinet FortiWeb enables pre-authenticated remote code execution (RCE). It has a a CVSS score of 9.8. Review the details in this Cybersecurity Threat Advisory to keep your environment safe. What is the threat?...

The cybersecurity gap is real—And MSPs are the solution
Despite frequent headlines about successful cyberattacks, many small businesses remain unprepared. Small business cybersecurity is still falling short in the face of growing threats. A survey of 1,000 small businesses with annual revenues of less than $100 million finds that...

Cybersecurity Threat Advisory: Fortinet FortiOS buffer overflow vulnerability
Fortinet disclosed a FortiOS operating system vulnerability, CVE-2025-24477, which has a CVSS score of 4.0. This vulnerability enables an authorized attacker to execute arbitrary code or commands to escalate privileges. Review the details of this Cybersecurity Threat Advisory to protect...

Ask an MSP Expert: How AI can help you personalize outreach and repurpose content
Artificial intelligence (AI) excels at spotting patterns and automating workflows, but what about the messy, one-off challenges that arise in real sales conversations? This is where skepticism can creep in. However, with the right approach, AI can still serve as...

Tip Tuesday: Enhance value with extended hardware lifecycle management
Staying on top of the hardware lifecycle is crucial for managing your clients’ information technology (IT) environments. Legacy technology can introduce security risks, and implementing extended hardware lifecycle management can be complex. In this edition of Tip Tuesday, explore how...

Is it time for MSPs to dive into the home cybersecurity market?
The question of whether managed service providers (MSPs) should enter the home cybersecurity market has been debated for years. While some MSPs have ventured into this area, it has not yet gained widespread traction—though that may soon change. The home...