Month: November 2025
Tech Time Warp: Celebrating 30 years of Pixar magic
For many families, going to the movies is as much of a Thanksgiving tradition as parades and pumpkin pie. This week’s Tech Time Warp goes back to Thanksgiving weekend 30 years ago—Pixar’s big break. Toy Story was released in theaters...
Five trends MSPs can be thankful for in 2025
While Thanksgiving has been a national holiday in the U.S. since 1863, the notion of setting aside a day to give thanks reaches as far back as 1623. Fast forward to 2025, and the tech landscape looks very different, but...
Caught between a rock and a hyperscaler
Remember the good old days when certain activities—hosting email, running data analytics, and delivering reports—were strong revenue drivers? With major players like AWS, Azure, and Google Cloud Platform (GCP) entering the arena, those capabilities quickly became table stakes. Each hyperscaler...
Cybersecurity Threat Advisory: Oracle Identity Manager vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog. Read this Cybersecurity Threat Advisory to learn about the current risk and apply relevant patches now. What...
Cybersecurity Threat Advisory: Fluent Bit vulnerabilities
Five vulnerabilities have been identified in Fluent Bit. Upon a successful exploitation, attackers could bypass authentication, perform path traversal, execute remote code, or cause denial of service. Review this Cybersecurity Threat Advisory now to secure you or your clients’ infrastructure....
Cybersecurity Threat Advisory: Critical Grafana SCIM vulnerability
A critical security vulnerability in Grafana Enterprise could allow attackers to escalate privileges and impersonate users. Tracked as CVE-2025-41115, the flaw carries the maximum CVSS score of 10.0. Continue reading this Cybersecurity Threat Advisory to learn how to protect you...
Holiday security reset: The playbook to outpace hackers
The holidays, with their twinkling lights and swirling snow, can be a gift for hackers and a lump of coal for companies. We don’t want your cyber stocking filled with coal at Christmas, which is why we’re talking to experts...
Cybersecurity Threat Advisory: 7-Zip symbolic link vulnerability
Attackers are actively exploiting a high-severity 7-Zip vulnerability, CVE-2025-11001. Attackers use malicious archives to abuse symbolic links, forcing writes outside the intended extraction directory and enabling remote code execution (RCE) when users interact. Review this Cybersecurity Threat Advisory for remediation...
Tech Time Warp: A bite-sized story from Apple history — how the Macintosh got its name
The 1984 introduction of the Macintosh computer featured the iconic and still-relevant Super Bowl commercial directed by Ridley Scott. More than 40 years later, this advertising masterpiece holds up, as does the brand it launched. Let’s dive into this week’s...
