Month: October 2025
Cybersecurity Threat Advisory: Critical WatchGuard firewall vulnerability
A critical vulnerability, CVE-2025-9242, has been identified in WatchGuard Firebox Network Security Appliances. This flaw exposes affected devices to the public internet and allows unauthenticated remote code execution. Review the details in this Cybersecurity Threat Advisory to understand the potential...
How AI is rewriting the rules of SEO
You may have noticed (and been annoyed by) changes in how search engines now work. Instead of entering a series of keywords and getting a selection of pages that cover all or most of them, you’re now met with a...
Tip Tuesday: Embrace Cybersecurity Awareness Month by being a security leader
Cybersecurity Awareness Month reminds organizations and individuals of the importance of staying safe in digital spaces. For managed service providers (MSPs), it offers an opportunity to demonstrate thought leadership and deepen client relationships by translating complex security concepts into practical,...
Cybersecurity Awareness Month ends soon, but the mission will continue
Cybersecurity Awareness Month may be winding down, but the work of protecting organizations never stops. This week, we’ve gathered insights from cybersecurity leaders across the industry who are tackling everything from human-centered security to emerging threats like shadow artificial intelligence...
Cybersecurity Threat Advisory: Critical Veeam backup flaws
Veeam has released Patch 12.3.2.4165 for Backup & Replication and Version 6.3.2.1302 for Veeam Agent for Microsoft Windows, addressing three serious vulnerabilities. These include two critical remote code execution (RCE) flaws (CVE-2025-48983, CVE-2025-48984) and one high-severity local privilege escalation (LPE)...
Cybersecurity Threat Advisory: FortiOS CLI command bypass vulnerability
Fortinet has disclosed a high-severity vulnerability in FortiOS, identified as CVE-2025-58325, which has a CVSS score of 7.8. This flaw could allow local authenticated attackers to execute arbitrary system commands. The vulnerability stems from improper input validation in the FortiOS...
Threat Spotlight: Unpacking a stealthy new phishing kit targeting Microsoft 365
In this edition of the Threat Spotlight we see that Phishing-as-a-Service (PhaaS) platforms dominate the email threat landscape. The most prominent are sophisticated, well-resourced platforms offering tools, infrastructure, and support in return for payment or a share of the profits....
Tech Time Warp: The multifaceted road to multifactor authentication
In the recent edition of “Oh Behave!,” the annual cybersecurity survey conducted by the National Cybersecurity Alliance, an alarming 44 percent of respondents said they had experienced cybercrime leading to the loss of data or money. This next statistic may...
Cybersecurity Threat Advisory: ChaosBot malware exploits Discord
A recently discovered Rust-based malware called ChaosBot is being used compromise computers via Discord channels. Review the details within this Cybersecurity Threat Advisory to learn more and see how to protect your system. What is the threat? ChaosBot is a...
Survey finds organizations looking to MSPs for AI cybersecurity expertise
A survey of over 3,880 business and technology leaders conducted by PwC finds that artificial intelligence (AI) is now the top cybersecurity technology that organizations are looking to managed service providers (MSPs) to help implement. According to the survey, 38...
