Month: March 2026
Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day
Recent reporting from Amazon Threat Intelligence and multiple security researchers confirms that the Interlock ransomware group is actively exploiting a critical remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) Software. Read this Cybersecurity Threat Advisory to protect...
Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE
A critical remote code execution (RCE) vulnerability in Microsoft SharePoint caused by the deserialization of untrusted data has been discovered. Authentication is not required by attackers on unprotected systems. Review the Cybersecurity Threat Advisory now to protect you and your...
Tech Time Warp: FBI releases its first warning about a computer virus
Twenty-six years ago, on March 28, 1999, the FBI took a historic step: Its National Infrastructure Protection Center (NIPC) issued its first warning about a computer virus. The NIPC had “received reports of significant network degradation and email outages,” and...
The talent strategy behind the most profitable IT service providers
A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...
Cybersecurity Threat Advisory: FortiCloud SSO exploitation
Threat actors are actively exploiting CVE‑2026‑24858 to log into FortiOS and other Fortinet products via FortiCloud SSO (when enabled), create persistent local admin accounts, and steal device configuration files. Review the Cybersecurity Threat Advisory now to protect you and your...
Why information security matters more than ever
It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...
Cybersecurity Threat Advisory: Critical Veeam Backup flaws
Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...
The quiet comeback of credential-based attacks
Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique
A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...
