Category: Featured
Cybersecurity Threat Advisory: SolarWinds ARM vulnerabilities
SolarWinds has issued patches to address two vulnerabilities in its Access Rights Manager (ARM) software. Out of the two, one is a critical vulnerability that can lead to remote code execution (RCE). Review the details within this Cybersecurity Threat Advisory...
Cybersecurity Threat Advisory: Active exploitation of Ivanti CSA vulnerability
A new vulnerability known as CVE-2024-8190 is affecting Ivanti Cloud Services Appliance (CSA) and is being actively exploited. This OS command injection vulnerability allows a remote, authenticated attacker to execute arbitrary commands on the system. Review the details in this...
Insights for navigating potential MSP adversities
Managed service providers (MSPs) must navigate an increasingly complex cyber world. From dealing with the Internet of Things (IoT), 5G, and ransomware, to managing hardware, education, and training. The intricacies of running a business, both theirs and their clients, can...
Maximize engagement and revenue with AI email marketing
Email is far from dead and remains one of the most cost-effective tools in the marketer’s toolbox. But thanks to AI, this tried-and-true engagement tool is getting a metaphorical facelift. With AI email marketing tools, you can better personalize content, increase...
The MSP’s role in rising data center demand
Managed service providers (MSPs) that require access to data centers to deliver services have known for a while now that demand for computer and storage services far outstrips the available supply. Vacancies in data centers hit a record low of...
Pioneers in Tech: Dorothy Vaughn, one of the women of Apollo
The woman who became NASA’s first Black manager was honored in July with the renaming of a central building at the Johnson Space Center in Houston. Learn all about her trailblazing career in this edition of Pioneers in Tech! On...
Content creation platforms leveraged for phishing attacks
Cybersecurity is an ever-evolving field, and as new solutions are introduced to better detect and defend against cyberthreats, attackers in turn need to adapt their tactics to try and evade those solutions. For example, Barracuda threat analysts have recently identified...
Ask an MSP Expert: Secrets to thriving in a fast-changing industry
Staying ahead of the rapidly evolving cyber threat landscape requires more than just technological prowess from a managed service providers (MSP). It demands a deep understanding of industry dynamics, and a robust network built off trust and collaboration. In the...
Cybersecurity Threat Advisory: Veeam Backup security flaws
There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...