Month: December 2025

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical FortiCloud SSO flaws

Cybersecurity Threat Advisory: Critical FortiCloud SSO flaws

Fortinet has disclosed two critical authentication bypass vulnerabilities in its FortiCloud SSO login feature. Both carry a CVSS score of 9.8, signaling near-maximum severity. Read this Cybersecurity Threat Advisory for more details on how to secure your network infrastructure. What...

/ December 12, 2025
The future of MSP success: Outcomes over offerings

The future of MSP success: Outcomes over offerings

A recent report from Guidehouse signals the dawn of a new era for managed services. By the end of 2025, fees and contracts will increasingly be tied to business outcomes rather than traditional service delivery. As this transition unfolds, expect...

/ December 11, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Microsoft Outlook vulnerability

Cybersecurity Threat Advisory: Critical Microsoft Outlook vulnerability

A newly disclosed Microsoft Outlook vulnerability, tracked as CVE-2025-62562, could allow for remote code execution (RCE). Read this Cybersecurity Threat Advisory to mitigate you and your clients’ risk now. What is the threat? This use-after-free vulnerability introduces a use-after-free flaw...

/ December 11, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical ArrayOS VPN flaw

Cybersecurity Threat Advisory: Critical ArrayOS VPN flaw

Attackers are exploiting a command injection vulnerability in ArrayOS AG VPN devices to plant PHP webshells and create rogue users. CISA has added this vulnerability to the Known Exploited Vulnerabilities (KEV) catalog. Review this Cybersecurity Threat Advisory to discover recommended...

/ December 10, 2025
10 Critical sales hunting skills every high-performing rep has

10 Critical sales hunting skills every high-performing rep has

Great sales hunters can open new opportunities, create pipelines from scratch, and drive consistent growth. Yet many reps labeled as hunters rely on personality instead of the behaviors that actually generate conversations. The real strength of a true hunter is...

/ December 10, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache Tika vulnerability

Cybersecurity Threat Advisory: Apache Tika vulnerability

A maximum-severity Extensible Markup Language (XML) External Entity (XXE) injection vulnerability has been disclosed in Apache Tika, tracked as CVE-2025-66516 with a CVSS score of 10.0. Review this Cybersecurity Threat Advisory now to mitigate your risk and potential impact. What...

/ December 10, 2025
Q&A: How MSPs can strengthen municipal cyber defenses

Q&A: How MSPs can strengthen municipal cyber defenses

Cities and municipalities continue to be under siege from hackers. In the past three months alone, several cities have been targeted by cybercriminals (and these are just the publicly reported cases): Michigan City, Indiana; Yellowknife, Canada; Sugar Land, Texas; McKinney,...

/ December 9, 2025
Barracuda Application Protection safeguards against critical React and Next.js flaws

Barracuda Application Protection safeguards against critical React and Next.js flaws

Two newly disclosed critical remote code execution (RCE) vulnerabilities—CVE-2025-55182 and CVE-2025-66478—pose a serious threat to applications built on React and Next.js. These flaws allow attackers to execute arbitrary code on vulnerable systems, which can lead to application compromise, unauthorized access and potential...

/ December 8, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Android framework exploits

Cybersecurity Threat Advisory: Android framework exploits

Google released the December 2025 Android Security Update to address 107 vulnerabilities across the Android OS and vendor components. The most critical aspect of this release is the remediation of two high-severity vulnerabilities. Review this Cybersecurity Threat Advisory to limit...

/ December 6, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical React2Shell vulnerability

Cybersecurity Threat Advisory: Critical React2Shell vulnerability

There are two critical unauthenticated remote code execution vulnerabilities in the React Server Components (RSC) “Flight” protocol. Continue reading this Cybersecurity Threat Advisory to learn how to protect you and your clients’ environments. What is the threat? These critical vulnerabilities...

/ December 6, 2025