Category: Featured

Positive outlook for managed services spending in 2025
Selling managed services to larger enterprises is distinctly different from selling them to smaller organizations. However, tracking the amount of spending specifically allocated to managed services by larger organizations does serve as a barometer to track overall expectations. For instance,...

Cybersecurity Threat Advisory: Xerox printer vulnerabilities
Two vulnerabilities, CVE-2024-12510 and CVE-2024-12511, have been found in the Xerox VersaLink C7025 Multifunction Printer. Upon successful exploitation, bad actors can capture authentication credentials through pass-back attacks via lightweight directory access protocol (LDAP), server message block (SMB), and file transfer...

Cybersecurity Threat Advisory: Critical Juniper vulnerability
A critical vulnerability, CVE-2025-21589, is found in Juniper Networks’ Session Smart Router, Session Smart Conductor, and WAN Assurance Router products. This flaw enables threat actors to bypass authentication mechanisms and gain administrative control over affected devices. Continue reading this Cybersecurity...

Cybersecurity Threat Advisory: Brute force attack targeting edge devices
The Shadowserver Foundation uncovered a large brute force attack, with approximately 2.8 million IPs launching attacks on edge devices like firewalls, routers, and VPNs. Continue to read this Cybersecurity Threat Advisory to learn how you can mitigate the risks of...

Cybersecurity Threat Advisory: High-severity PAN-OS vulnerability
A high-severity authentication bypass vulnerability in PAN-OS software, CVE-2025-0108, was disclosed. This flaw allows unauthenticated attackers with network access to bypass authentication and invoke PHP scripts, compromising system integrity and confidentiality. Read this Cybersecurity Threat Advisory to learn how you can...

Tech Time Warp: It’s the Storm Worm, not a secret admirer
The FBI had a real Debbie Downer message to deliver in 2008: That unexpected Valentine’s Day e-card was not from a secret admirer. Instead, it was an invitation for the unwitting recipient to join the Storm Worm botnet. Learn all...

Cybersecurity Threat Advisory: Apple critical zero-day vulnerability
Apple has issued emergency security updates to address a critical zero-day vulnerability, CVE-2025-24200, which has been exploited in targeted and “extremely sophisticated” attacks. This vulnerability affects iPhone and iPad users, posing significant risks to user security. Review the details of...

DeepSeek AI creates AI governance opportunity for MSPs
The launch of a lower-cost method for creating generative AI models with minimal guardrails has sparked controversy. This has highlighted the need for governance policies, which managed service providers (MSPs) will often enforce. Developed by researchers in China, the DeepSeek...

Cybersecurity Threat Advisory: Critical vulnerabilities in Kemp LoadMaster
Kemp LoadMaster Load Balancer contains five high-severity vulnerabilities that can cause major disruptions to a network upon a successful exploitation. Review this Cybersecurity Threat Advisory to learn how to protect against these vulnerabilities. What is the threat? Kemp LoadMaster disclosed...

Top 3 cybersecurity predictions for successful MSPs in 2025
With the dawn of a new year comes new cybersecurity threats, technology developments, and challenges for managed service providers (MSPs) regarding keeping client networks and applications safe. Artificial intelligence (AI) and cloud adoption continue to accelerate the evolution of the...