Category: Featured

Cybersecurity Threat Advisory: Apple critical zero-day vulnerability
Apple has issued emergency security updates to address a critical zero-day vulnerability, CVE-2025-24200, which has been exploited in targeted and “extremely sophisticated” attacks. This vulnerability affects iPhone and iPad users, posing significant risks to user security. Review the details of...

DeepSeek AI creates AI governance opportunity for MSPs
The launch of a lower-cost method for creating generative AI models with minimal guardrails has sparked controversy. This has highlighted the need for governance policies, which managed service providers (MSPs) will often enforce. Developed by researchers in China, the DeepSeek...

Cybersecurity Threat Advisory: Critical vulnerabilities in Kemp LoadMaster
Kemp LoadMaster Load Balancer contains five high-severity vulnerabilities that can cause major disruptions to a network upon a successful exploitation. Review this Cybersecurity Threat Advisory to learn how to protect against these vulnerabilities. What is the threat? Kemp LoadMaster disclosed...

Top 3 cybersecurity predictions for successful MSPs in 2025
With the dawn of a new year comes new cybersecurity threats, technology developments, and challenges for managed service providers (MSPs) regarding keeping client networks and applications safe. Artificial intelligence (AI) and cloud adoption continue to accelerate the evolution of the...

Why DMARC is essential for email security
As advanced security solutions make it more challenging for traditional malware and other attacks to succeed, cybercriminals are increasingly turning to domain spoofing and artificial intelligence (AI) to create more sophisticated and convincing phishing attacks. Recently, the North Korean cybercrime...

How can MSPs ensure their own cybersecurity?
Managed service providers (MSPs) are at the leading edge of providing cybersecurity services. They provide and procure vital perimeter protections to most of their client as part of their service packages. However, MSPs are vulnerable to hacks, and if a...

Cybersecurity Threat Advisory: Severe Cisco ISE vulnerabilities
Two critical vulnerabilities have been identified in Cisco’s Identity Services Engine (ISE). These vulnerabilities can enable attackers to execute arbitrary commands with root privileges and bypass authorization mechanisms, potentially compromising the security and integrity of network access controls. Continue reading...

Pioneers in Tech: Marian Croak, an “American idol” with 200 patents
Readers of a certain age will remember the frustration of trying to dial in their votes for Kelly Clarkson during the first season of American Idol. The phone lines would become overloaded! Most of us dialing in for Kelly probably...

Cybersecurity Threat Advisory: Critical Azure vulnerabilities
Microsoft revealed two critical vulnerabilities in Microsoft Azure AI Face Service, a cloud-based facial recognition tool. They enable attackers to bypass authentication. Review the details within this Cybersecurity Threat Advisory to discover the key steps to safeguard your environment. What...

Cybersecurity Threat Advisory: Microsoft SharePoint connector vulnerability
A critical security vulnerability was identified in Microsoft Power Platform’s SharePoint connector. The flaw allows attackers to harvest user credentials and perform unauthorized actions within the platform upon a successful exploitation. Continue reading this Cybersecurity Threat Advisory to learn how...