Category: Featured

Tech Time Warp
Tech Time Warp: An APT programming language

Tech Time Warp: An APT programming language

In conjunction with research centers like the Massachusetts Institute of Technology (MIT), the defense industry drove many rapid technological advances post-World War II. That’s where Douglas T. Ross and his team significantly sped up manufacturing with the development of the...

/ February 21, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New OpenSHH vulnerabilities

Cybersecurity Threat Advisory: New OpenSHH vulnerabilities

Two OpenSSH vulnerabilities, CVE-2025-26465 and CVE-2025-26466, affect multiple versions of OpenSSH. These vulnerabilities can be exploited for man-in-the-middle (MitM) attacks or cause a denial-of-service (DoS) attack. Review this Cybersecurity Threat Advisory to mitigate your risk. What is the threat? OpenSSH...

/ February 20, 2025
managed services spending
Positive outlook for managed services spending in 2025

Positive outlook for managed services spending in 2025

Selling managed services to larger enterprises is distinctly different from selling them to smaller organizations. However, tracking the amount of spending specifically allocated to managed services by larger organizations does serve as a barometer to track overall expectations. For instance,...

/ February 20, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Xerox printer vulnerabilities

Cybersecurity Threat Advisory: Xerox printer vulnerabilities

Two vulnerabilities, CVE-2024-12510 and CVE-2024-12511, have been found in the Xerox VersaLink C7025 Multifunction Printer. Upon successful exploitation, bad actors can capture authentication credentials through pass-back attacks via lightweight directory access protocol (LDAP), server message block (SMB), and file transfer...

/ February 19, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Juniper vulnerability

Cybersecurity Threat Advisory: Critical Juniper vulnerability

A critical vulnerability, CVE-2025-21589, is found in Juniper Networks’ Session Smart Router, Session Smart Conductor, and WAN Assurance Router products. This flaw enables threat actors to bypass authentication mechanisms and gain administrative control over affected devices. Continue reading this Cybersecurity...

/ February 19, 2025
Tip Tuesday
Tip Tuesday: Improve cash flow with effective billing practices

Tip Tuesday: Improve cash flow with effective billing practices

If you’ve been a managed service provider (MSP) for a while, you’ve likely encountered demanding customers and overdue accounts. While there’s no foolproof way to completely resolve this challenge, improving your billing practices can help reduce the issue. Continue reading...

/ February 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Brute force attack targeting edge devices

Cybersecurity Threat Advisory: Brute force attack targeting edge devices

The Shadowserver Foundation uncovered a large brute force attack, with approximately 2.8 million IPs launching attacks on edge devices like firewalls, routers, and VPNs. Continue to read this Cybersecurity Threat Advisory to learn how you can mitigate the risks of...

/ February 18, 2025
MSP Training
MSP Training: How often and what kind?

MSP Training: How often and what kind?

According to Barracuda Network’s Evolving Landscape of the MSP 2024 report, 38 percent of managed service providers (MSPs) offer security awareness training (SAT). However, experts say that the percentage should be much higher because of the high return on investment...

/ February 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: High-severity PAN-OS vulnerability

Cybersecurity Threat Advisory: High-severity PAN-OS vulnerability

A high-severity authentication bypass vulnerability in PAN-OS software, CVE-2025-0108, was disclosed. This flaw allows unauthenticated attackers with network access to bypass authentication and invoke PHP scripts, compromising system integrity and confidentiality. Read this Cybersecurity Threat Advisory to learn how you can...

/ February 17, 2025
The importance of flexible deployment in email security solutions

The importance of flexible deployment in email security solutions

Companies are facing an increasing array of sophisticated threats, particularly through business email channels. These threats can disrupt operations, expose sensitive data, and cost the companies millions of dollars in recovery costs, compliance penalties, and lawsuit settlements. This adds to any...

/ February 17, 2025