Category: Featured
Tech Time Warp: A salute to the floppy disk, the foundation of “sneakernet”
The denizens of Gen Z and Gen Alpha may have never used floppy disks, and they may have never given much thought to what the “Save” icon represents. And, like the giant cell phones of the 1990s, the floppy disk...
Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities
Apple has released urgent security updates for older iPhones and iPads to address multiple vulnerabilities actively exploited in the wild via the Coruna exploit kit—a sophisticated attack framework used by both espionage groups and cybercriminals. Read this Cybersecurity Threat Advisory...
Cybersecurity Threat Advisory: PureLog Stealer malware campaign
A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
Cybersecurity Threat Advisory: Telecoms targeted with new malware
A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory. What is the...
Cybersecurity Threat Advisory: Critical NetScaler ADC and Gateway vulnerability
Citrix has released security updates to address a critical information disclosure vulnerability affecting NetScaler ADC and NetScaler Gateway. The flaw allows unauthenticated remote attackers to retrieve sensitive information from vulnerable appliances via the HTTP/HTTPS interface. Read this Cybersecurity Threat Advisory...
How MSPs grow email lists using LinkedIn
Key Takeaways Treat LinkedIn as the top of a list-building strategy, not the destination. Offer practical resources MSP buyers care about to earn email opt-ins. Use a Pillar–Cluster–Dot–FAQ framework to turn one topic into ongoing LinkedIn engagement. Most IT providers...
How MSPs can keep the peace during conflict
When international conflicts arise — and the world has seen no shortage in recent years — organizations of all sizes need to stay especially alert. In many cases, managed service providers (MSPs) serve as the first line of defense, helping...
Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day
Recent reporting from Amazon Threat Intelligence and multiple security researchers confirms that the Interlock ransomware group is actively exploiting a critical remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) Software. Read this Cybersecurity Threat Advisory to protect...
