Month: May 2026

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Catalyst SD-WAN zero day vulnerability

Cybersecurity Threat Advisory: Cisco Catalyst SD-WAN zero day vulnerability

An authentication bypass zero-day vulnerability, tracked as CVE-2026-20182 with a maximum CVSS score of 10.0, has been identified in Cisco Catalyst SD-WAN Controller and Manager. The vulnerability allows unauthenticated attackers to gain the highest level of administrative access to affected...

/ May 20, 2026
patching
Patch management: The basics still matter

Patch management: The basics still matter

Patching is such a core part of MSP DNA that it’s easy to overlook. I’ve talked with many MSP owners who get pulled into the latest, most urgent cyberthreats—only to lose sight of the basics: patching. Patching is the cybersecurity...

/ May 19, 2026
Global MSP Day
Tip Tuesday: Use Global MSP Day to set 5 powerful goals for the coming year

Tip Tuesday: Use Global MSP Day to set 5 powerful goals for the coming year

When you’re a managed service provider (MSP), it’s easy to get caught up in the day-to-day tasks. Soon, the broader picture gets pushed aside as your team remains stuck in day-to-day operations. As we head into the 9th Annual Global...

/ May 19, 2026
MSPs
What Your MSP competitors reveal (and how to sell against it)

What Your MSP competitors reveal (and how to sell against it)

Most MSPs doing competitive research are looking at the wrong things. Follower counts. Engagement rates. Whether a competitor posted three times last week or once. Some of this is useful information – an up-to-date, active social media presence can immediately...

/ May 18, 2026
Tech Time Warp
Tech Time Warp: Ransomware continues to make computer users WannaCry

Tech Time Warp: Ransomware continues to make computer users WannaCry

This month’s Canvas ransomware attack—in addition to making finals week more stressful for thousands of college students and their professors—was a stark reminder about the continued threat of ransomware. Consider it a bit of a Tech Time Warp. It’s enough...

/ May 15, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RedSun exploits Microsoft Defender real-time protection

Cybersecurity Threat Advisory: RedSun exploits Microsoft Defender real-time protection

A new proof of concept (PoC), RedSun, exploits Windows devices running Microsoft Defender real‑time protection on Windows 10, Windows 11, and Windows Server 2019+. It abuses Defender’s handling of cloud‑tagged files to achieve local privilege escalation to SYSTEM. Read this...

/ May 15, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: BitUnlocker attack

Cybersecurity Threat Advisory: BitUnlocker attack

A newly published proof of concept (PoC) tool called BitUnlocker demonstrates a dangerous downgrade attack that can bypass Microsoft’s BitLocker full‑disk encryption on Windows 11 devices. Continue reading this Cybersecurity Threat Advisory to minimize your risk. What is the threat? BitUnlocker...

/ May 15, 2026
cloud spend
Survey shows MSPs with cloud optimization expertise are in need

Survey shows MSPs with cloud optimization expertise are in need

A survey of 300 U.S. finance leaders at organizations with more than $50 million in revenue suggests companies are looking to fund artificial intelligence (AI) initiatives in part by optimizing cloud spending. Surging cloud costs A survey conducted by market...

/ May 14, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: GhostLock – A new denial-of-availability attack technique

Cybersecurity Threat Advisory: GhostLock – A new denial-of-availability attack technique

GhostLock is a newly disclosed attack technique that abuses the Windows CreateFileW API to lock enterprise files by requesting exclusive, deny‑share handles. Read this Cybersecurity Threat Advisory to learn how to limit your organization’s exposure to this attack. What is...

/ May 14, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RMM-based phishing attacks

Cybersecurity Threat Advisory: RMM-based phishing attacks

An ongoing phishing campaign has been observed targeting multiple vectors and leveraging legitimate Remote Monitoring and Management (RMM) tools to establish persistent remote access on compromised hosts. Read this Cybersecurity Threat Advisory to mitigate risk for you and your clients....

/ May 14, 2026