
Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks
F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provide malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the...

Cybersecurity Threat Advisory: TLStorm 2.0 vulnerabilities
Up to 5 vulnerabilities were uncovered within the use of the TLS protocol in multiple models of the Aruba and Avaya Network switches. These vulnerabilities, if exploited, can provide threat actors remote access to enterprise networks and to transfer confidential...

Cybersecurity Threat Advisory: Apache CouchDB critical vulnerability
Apache has released a patch for a critical remote privilege escalation vulnerability in Apache CouchDB 3.2.1 protocol. This vulnerability, if not patched, can allow threat actors to execute code on a targeted server or client without being authenticated. Barracuda MSP...

Ask an MSP Expert: What is the best way to expand my security service offering?
Q: We are finding it harder than ever to protect our customers with the security solutions we currently offer. Not only are they generating a lot of alerts, many of which turn out to be false positives once my team...

Cybersecurity Threat Advisory: GitLab vulnerability could allow account takeover
GitLab released an advisory on Thursday, March 31st regarding a new critical vulnerability found in their product, currently being tracked as CVE-2022-1162. This vulnerability can lead to vulnerable account takeover when exploited. GitLab has released a security patch, and Barracuda...

Ask an MSP Expert: How can we streamline our patch management process?
Q: With the increase of cyber attacks and the growing remote workers, what are some best patch management practices to better protect my customers? Patch management serves as a key defense against cyber threats and is also required to ensure...

Barracuda Networks and Apache Log4j vulnerability
The Log4j vulnerability has recently made headlines around the world. Concerns around this vulnerability center on the fact that an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message...

Ask an MSP Expert: How can I convince customers to add cloud backup?
Q: As an MSP owner, I know how cloud backup serves a vital purpose for protecting my clients’ Microsoft Office 365 environment. How can I best convince my customers that cloud backup is required for Office 365 even if retention...

Prepare for the next cyberattack with a cybersecurity checklist
From the supply-chain attack at the beginning of the year, to the ransomware attack that took down a major pipeline in the United States, cyberattacks have been doing significant damage in recent times. Now, the latest supply-chain attack that some...

Remote work cybersecurity: Choosing between VPN and ZTNA
With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...