Category: Featured
Ask an MSP Expert: Key strategies to converting leads
Converting leads into sales pipeline is an art, and it starts with the initial conversation you have with a lead. Whether you opt for a phone call or email, the timing and approach are key factors in moving the lead...
Cybersecurity Threat Advisory: Adobe ColdFusion vulnerability
A vulnerability within Adobe ColdFusion could result in arbitrary system file reads and writes. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat? The vulnerability, tracked as CVE-2024-20767, was found within the...
Tech Time Warp: Santy comes to town
Twenty years ago, network administrators found themselves dealing with an unwelcome holiday visitor: not Santa, but Santy. Learn all about it in this edition of Tech Time Warp. The Santy worm was malware written in the Perl language. It didn’t...
Cybersecurity Threat Advisory: Critical Windows kernel vulnerability
A pointer dereference weakness was discovered within the Microsoft Kernel Streaming Service that would allow an attacker to escalate their privileges to SYSTEM without any user interaction being required. Review the details in this Cybersecurity Threat Advisory to learn how...
Cybersecurity Threat Advisory: New social engineering campaign
An active social engineering campaigns uses Microsoft Teams and AnyDesk to deploy DarkGate malware. Attackers are impersonating trusted contacts during Teams calls to deceive victims into installing remote access tools, facilitating unauthorized system access, and deploying the malware. Review the...
Cybersecurity Threat Advisory: Microsoft MFA AuthQuake flaw
A new critical security flaw in Microsoft’s multi-factor authentication (MFA) system has been discovered. It enables attackers to easily bypass the protection and gain unauthorized access to user accounts. Review this Cybersecurity Threat Advisory to learn how to mitigate your...
Cybersecurity Threat Advisory: CoinLurker malware exploit
Threat actors have begun using bogus software updates to deliver a new stealer malware known as “CoinLurker.” This malware uses cutting-edge obfuscation and anti-analysis techniques, making them frighteningly effective for threat actors. Continue reading this Cybersecurity Threat Advisory to learn...
Survey suggests opportunities for managed network services
A global survey of over 500 professionals in the areas of networking, operations, cloud, and architecture finds nearly two-thirds (65 percent) relies on third parties to deliver managed network services. A full 84 percent regularly learn about network issues from...
Key strategies for MSPs to improve IoT security
As the number of connected devices continues to rise— with the International Data Corporation (IDC) forecasting over 55 billion by 2025—managed service providers (MSPs) are facing increasing challenges to deliver security at scale. In October, SmarterMSP.com posted an article about...
Cybersecurity Threat Advisory: Ivanti CSA authentication bypass vulnerability
Ivanti has issued a warning about a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution, tracked as CVE-2024-11639. The vulnerability allows remote attackers to gain administrative privileges without authentication or user interaction, enabling them to bypass security...