Category: Featured

Tech Time Warp
Tech Time Warp: Slicing into the history of CT scans

Tech Time Warp: Slicing into the history of CT scans

A CT scan is so commonplace no one thinks twice about it anymore—but, as with all things technology, we really should. Take a look at the history behind CT scans in this edition of Tech Time Warp. Forty-two years ago,...

/ July 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability in Google’s Gemini for Workspace

Cybersecurity Threat Advisory: Vulnerability in Google’s Gemini for Workspace

A newly discovered vulnerability in Google’s Gemini for Workspace allows attackers to manipulate artificial intelligence (AI)-generated email summaries. Threat actors embed concealed instructions in seemingly benign emails to bypass traditional email security. Review the details within this Cybersecurity Threat Advisory...

/ July 24, 2025
Survey: MSPs play a pivotal role to organizations’ cloud success

Survey: MSPs play a pivotal role to organizations’ cloud success

A survey of over 280 IT leaders from organizations in the U.S. and Europe, each generating over $200 million in annual revenue, reveals that 57 percent expect to increase their reliance on managed service providers (MSPs) for managing, governing, and...

/ July 24, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CrushFTP zero-day vulnerability

Cybersecurity Threat Advisory: CrushFTP zero-day vulnerability

CrushFTP has disclosed a new critical vulnerability, CVE-2025-54309, which is currently being exploited in the wild. One indicator of compromise is a “last_logins” value set for internal default accounts. Review the details in this Cybersecurity Threat Advisory to help minimize...

/ July 23, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer

Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer

Security researchers have uncovered a new attack method known as “FileFix,” which exploits Windows File Explorer to execute stealthy PowerShell commands. By abusing legitimate Windows functionality, attackers can run malicious code while evading traditional security controls. Read this Cybersecurity Threat...

/ July 19, 2025
Pioneers in Tech
Pioneers in Tech: The man behind Moore’s Law

Pioneers in Tech: The man behind Moore’s Law

July 18 marks the 57th anniversary of Intel’s incorporation—and as with any of the Silicon Valley juggernauts, the backstory of its founders is fascinating. Take Gordon Moore, who—along with Robert Noyce and Andy Grove—incorporated the microprocessor company in 1968 and...

/ July 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft SQL server zero-day vulnerability

Cybersecurity Threat Advisory: Microsoft SQL server zero-day vulnerability

A critical information disclosure vulnerability has been identified in Microsoft SQL Server, designated as CVE-2025-49719 with a CVSS score of 7.5. This vulnerability allows unauthorized attackers to access sensitive data over a network, posing a serious risk to organizations that...

/ July 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FortiWeb critical SQL injection vulnerability

Cybersecurity Threat Advisory: FortiWeb critical SQL injection vulnerability

A high-severity SQL injection vulnerability, CVE-2025-25257, in Fortinet FortiWeb enables pre-authenticated remote code execution (RCE). It has a  a CVSS score of 9.8. Review the details in this Cybersecurity Threat Advisory to keep your environment safe. What is the threat?...

/ July 17, 2025
The cybersecurity gap is real—And MSPs are the solution

The cybersecurity gap is real—And MSPs are the solution

Despite frequent headlines about successful cyberattacks, many small businesses remain unprepared. Small business cybersecurity is still falling short in the face of growing threats. A survey of 1,000 small businesses with annual revenues of less than $100 million finds that...

/ July 17, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Fortinet FortiOS buffer overflow vulnerability

Cybersecurity Threat Advisory: Fortinet FortiOS buffer overflow vulnerability

Fortinet disclosed a FortiOS operating system vulnerability, CVE-2025-24477, which has a CVSS score of 4.0. This vulnerability enables an authorized attacker to execute arbitrary code or commands to escalate privileges. Review the details of this Cybersecurity Threat Advisory to protect...

/ July 17, 2025