Category: Featured

SOC case files
The SOC case files: XDR neutralizes threat targeting MSP

The SOC case files: XDR neutralizes threat targeting MSP

This edition of the SOC case files showcases how an incident was detected, contained, and mitigated in about a minute. The SOC is part of Barracuda Managed XDR, an extended visibility, detection, and response (XDR) service. It provides customers with...

/ December 24, 2024
2024 cybersecurity
Experts look back at 2024’s cybersecurity news

Experts look back at 2024’s cybersecurity news

The year 2024 was full of cybersecurity news. It was a year of data breaches, ransomware, the rise of quantum computing, and much more. The only constant was change. As ransomware continued to wreak havoc, according to Security Intelligence, ransomware...

/ December 24, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Three critical Sophos firewall vulnerabilities

Cybersecurity Threat Advisory: Three critical Sophos firewall vulnerabilities

Sophos has disclosed three critical vulnerabilities in its firewall product that could allow remote unauthenticated attackers to perform structured query language (SQL) injection, execute arbitrary code, and gain privileged secure shell (SSH) access to affected devices. Review the details of...

/ December 23, 2024
Ask an MSP Expert: Key strategies to converting leads

Ask an MSP Expert: Key strategies to converting leads

Converting leads into sales pipeline is an art, and it starts with the initial conversation you have with a lead. Whether you opt for a phone call or email, the timing and approach are key factors in moving the lead...

/ December 23, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Adobe ColdFusion vulnerability

Cybersecurity Threat Advisory: Adobe ColdFusion vulnerability

A vulnerability within Adobe ColdFusion could result in arbitrary system file reads and writes. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat? The vulnerability, tracked as CVE-2024-20767, was found within the...

/ December 21, 2024
Tech Time Warp
Tech Time Warp: Santy comes to town

Tech Time Warp: Santy comes to town

Twenty years ago, network administrators found themselves dealing with an unwelcome holiday visitor: not Santa, but Santy. Learn all about it in this edition of Tech Time Warp. The Santy worm was malware written in the Perl language. It didn’t...

/ December 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Windows kernel vulnerability

Cybersecurity Threat Advisory: Critical Windows kernel vulnerability

A pointer dereference weakness was discovered within the Microsoft Kernel Streaming Service that would allow an attacker to escalate their privileges to SYSTEM without any user interaction being required. Review the details in this Cybersecurity Threat Advisory to learn how...

/ December 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New social engineering campaign

Cybersecurity Threat Advisory: New social engineering campaign

An active social engineering campaigns uses Microsoft Teams and AnyDesk to deploy DarkGate malware. Attackers are impersonating trusted contacts during Teams calls to deceive victims into installing remote access tools, facilitating unauthorized system access, and deploying the malware. Review the...

/ December 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft MFA AuthQuake flaw

Cybersecurity Threat Advisory: Microsoft MFA AuthQuake flaw

A new critical security flaw in Microsoft’s multi-factor authentication (MFA) system has been discovered. It enables attackers to easily bypass the protection and gain unauthorized access to user accounts. Review this Cybersecurity Threat Advisory to learn how to mitigate your...

/ December 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CoinLurker malware exploit

Cybersecurity Threat Advisory: CoinLurker malware exploit

Threat actors have begun using bogus software updates to deliver a new stealer malware known as “CoinLurker.” This malware uses cutting-edge obfuscation and anti-analysis techniques, making them frighteningly effective for threat actors. Continue reading this Cybersecurity Threat Advisory to learn...

/ December 19, 2024