Category: Featured

Tech Time Warp: It’s MyLife, the email worm of spring 2002

Tech Time Warp: It’s MyLife, the email worm of spring 2002

The year was 2002 when this week’s Tech Time Warp was born. Email and the internet were still enough of a novelty that unwitting computer users were duped by an email worm promising fun screensavers. In multiple variants claiming to...

/ March 6, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: APT28 targets Windows and Office via MSHTML zero‑day

Cybersecurity Threat Advisory: APT28 targets Windows and Office via MSHTML zero‑day

Multiple security researchers and Microsoft have confirmed that the threat actor APT28 (Fancy Bear / Forest Blizzard) actively exploited a zero‑day vulnerability in the Microsoft MSHTML framework (CVE‑2026‑21513) prior to its fix in the February 2026 Patch Tuesday release. Read...

/ March 4, 2026
The truth about AI search optimization for MSPs (and no, SEO is not dead)

The truth about AI search optimization for MSPs (and no, SEO is not dead)

If you’ve spent any time around MSP marketing conversations lately, it probably feels like the rules of visibility are changing every other week. SEO is dead. AI search is taking over. You need AEO. GEO. EEAT. Whatever the acronym of...

/ March 4, 2026
MSPs must adapt to stay ahead of AI-driven phishing

MSPs must adapt to stay ahead of AI-driven phishing

Phishing has long been cybercriminals’ weapon of choice — and the numbers remain sobering. In 2024, the FBI recorded 193,407 phishing complaints in the U.S. alone, while Business Email Compromise schemes caused $2.77 billion in losses. And when a breach...

/ March 3, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Reported by SecurityWeek on February 20, 2026, PromptSpy is a newly identified Android malware family developed by threat actors. Its standout capability is using Google Gemini at runtime to analyze on‑screen content and help the malware remain installed and active...

/ March 2, 2026
That’s not our admin: The blind spots that open doors to attackers

That’s not our admin: The blind spots that open doors to attackers

Lessons from around 600,000 security alerts analyzed by Barracuda Managed XDR Takeaways In 2025, 90% of ransomware incidents exploited firewalls, and the fastest observed ransomware case took three hours from breach to encryption. The most widely detected CVE vulnerability dates...

/ March 2, 2026
Tech Time Warp: TJX hack exposes the depth to which consumer data is at risk

Tech Time Warp: TJX hack exposes the depth to which consumer data is at risk

These days, one expects to be notified one or two times a year about potential exposure in a data breach. Nineteen years ago, that wasn’t as commonplace—and we were learning just how widespread the problem could be. In January 2007,...

/ February 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero-day Cisco Catalyst SD-WAN flaw

Cybersecurity Threat Advisory: Zero-day Cisco Catalyst SD-WAN flaw

A critical authentication‑bypass flaw in Cisco Catalyst SD‑WAN, tracked as CVE‑2026‑20127, is being actively exploited as a zero‑day. The vulnerability allows remote attackers to compromise controllers and introduce malicious rogue peers into targeted networks. Review the Cybersecurity Threat Advisory now...

/ February 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware Aria Operations vulnerabilities

Cybersecurity Threat Advisory: VMware Aria Operations vulnerabilities

On February 24, 2026, Broadcom released a critical security advisory addressing three distinct vulnerabilities in VMware Aria Operations. These flaws—ranging from Command Injection to Privilege Escalation—can compromise the confidentiality, integrity, and administrative control of affected systems. Immediate patching is required...

/ February 26, 2026