Category: Featured

Cybersecurity Threat Advisory: BYOI endpoint detection and response bypass
A sophisticated attack technique known as “Bring Your Own Installer” (BYOI) has been employed by threat actors to bypass SentinelOne’s tamper protection, facilitating the deployment of Babuk ransomware. This method leverages legitimate installers to execute malicious payloads, effectively evading endpoint...

Cybersecurity incident response plan: An essential MSP practice
Managed service providers (MSPs) are often tasked with providing cybersecurity for their clients. But what happens when a cyberattack happens? Usually, decisions need to be made rapidly and actions taken within minutes. That’s why having incident response plans is critical....

Cybersecurity Threat Advisory: Commvault Web Server vulnerability
A high-severity Commvault Web Server vulnerability, CVE-2025-3928, with a CVSS score of 8.7, has been disclosed. To mitigate your risk, continue reviewing this Cybersecurity Threat Advisory. What is the threat? CVE-2025-3928 affect Commvault Web Server versions prior to 11.36.46, 11.32.89,...

Cybersecurity Threat Advisory: Apple AirPlay zero-day vulnerability
Researchers have discovered a critical vulnerability in Apple’s AirPlay protocol. It affects both Apple devices that support AirPlay as well as third-party devices that interface with it. The flaw can enable an attacker to fully takeover a device without the...

Cybersecurity Threat Advisory: Microsoft Windows process activation vulnerability
A local privilege escalation vulnerability, CVE-2025-21204, in the Windows Update Stack has been discovered. It allows an authorized attacker to elevate privileges by exploiting improper link resolution before file access. Review this Cybersecurity Threat Advisory to mitigate your risk. What...

Cybersecurity Threat Advisory: Critical zero-day SAP vulnerability
SAP published a critical vulnerability, CVE-2025-31324 with a CVSSv3 score of 10.0. The flaw is actively exploited in the wild. Successful exploitation can lead to arbitrary file uploads, leading to remote code execution (RCE) and full system compromise. Review this...

Tech Time Warp: A Blaster from the past
Although early conclusions suggest a cyber attack was not the cause of the historic April 28 power outages in Spain, Portugal, and parts of France, only time and the inevitable investigations will tell. The blackout does bring to mind another...

Cybersecurity Threat Advisory: Craft CMS exploited
Threat actors have been actively exploiting two Craft CMS vulnerabilities, CVE-2025-32432 and CVE-2024-58136, to breach web servers and gain unauthorized access. Review the details in this Cybersecurity Threat Advisory to safeguard your devices. What is the threat? Threat actors are...

Cybersecurity Threat Advisory: ScreenConnect vulnerability
Researchers have discovered a vulnerability in the ScreenConnect remote support software that upon a successful exploitation, can allow for remote execution on a targeted server. Continue reading this Cybersecurity Threat Advisory to learn how to keep your environment safe. What...