Category: Featured

LLMs
Unraveling the cybersecurity risks of LLMs

Unraveling the cybersecurity risks of LLMs

As language learning models (LLMs) become more prevalent, the cyber dangers posed by DeepSeek, ChatGPT, Claude, and others are just beginning to be understood. Jacob Anderson, owner of Beyond Ordinary, states that cyber personnel are overworked and continue to have...

/ June 17, 2025
Email Threat Radar
Email Threat Radar – June 2025

Email Threat Radar – June 2025

In this edition of the Email Threat Radar, we see how during May, threat analysts identified several notable email-based threats targeting organizations around the world and designed to evade detection and boost the chances of success, including: The EvilProxy phishing...

/ June 16, 2025
Pioneers in tech
Pioneers in Tech: The chance to own the image of a visionary

Pioneers in Tech: The chance to own the image of a visionary

If you have a couple of hundred thousand dollars to spare, you currently have the opportunity to purchase the only known photographs of the world’s first computer programming visionary, Ada Lovelace. Discover her legacy in this edition of Pioneers in...

/ June 13, 2025
cloud partnerships
Survey shows growing dependence on cloud partners

Survey shows growing dependence on cloud partners

A survey of 1,800 senior IT decision-makers finds that more than half (52 percent) of respondents said their organization relies on professional services for specific cloud-related needs, with 28 percent being heavily dependent on professional cloud partners for all aspects...

/ June 12, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Wazuh servers targeted to launch Mirai attacks

Cybersecurity Threat Advisory: Wazuh servers targeted to launch Mirai attacks

Threat actors are actively targeting Wazuh servers running software version 4.4.0 by exploiting a vulnerability that enables them to install Mirai botnets. These botnets facilitate distributed denial of service (DDoS) attacks against victims and execute malicious payloads on the compromised...

/ June 12, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Fortinet vulnerability exploited by Qilin ransomware

Cybersecurity Threat Advisory: Critical Fortinet vulnerability exploited by Qilin ransomware

The Qilin ransomware group is exploiting two critical Fortinet vulnerabilities that allow attackers to bypass authentication and execute remote code on vulnerable systems. Read this Cybersecurity Threat Advisory to discover the tactics used and the best practices you can implement...

/ June 11, 2025
cold outreach
How MSPs can fuel faster growth with AI + cold outreach

How MSPs can fuel faster growth with AI + cold outreach

Dave leads a B2B services firm with a dedicated sales team of three. Over the past year, they’ve invested time and resources into cold outreach, hiring sales reps, and launching marketing campaigns. Despite these efforts, the results have been underwhelming,...

/ June 11, 2025
phishing
An MSP’s guide to keeping up with phishing

An MSP’s guide to keeping up with phishing

Phishing has long been a primary tool in the hacker’s arsenal, but like military weapons, their tactics evolve. A phishing attempt in 2025 looks different from those in 2015, 2020, or even last year. Therefore, managed service providers (MSPs) must...

/ June 10, 2025
Email
Email scams: A year-round challenge for businesses of all sizes

Email scams: A year-round challenge for businesses of all sizes

In today’s rapidly changing digital landscape, businesses and consumers face a constant stream of cyberthreats – not just during peak periods like tax season, back-to-school, and holiday shopping, but all year. In fact, according to Barracuda’s 2025 Email Threats Report,...

/ June 9, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Cisco ISE vulnerability

Cybersecurity Threat Advisory: Critical Cisco ISE vulnerability

The Cisco Identity Services Engine (ISE) has a critical vulnerability, CVE-2025-20286, with a CVSS score of 9.9 out of 10. If successfully exploited, threat actors can gain privileged access without authentication and perform unauthorized operations on vulnerable systems. Read this...

/ June 6, 2025