Category: Featured

WolfGPT
WolfGPT: The “upgraded” dark AI for malware

WolfGPT: The “upgraded” dark AI for malware

As the landscape of cybercrime continues to evolve, WolfGPT is one tool that has emerged as a formidable player in the realm of malicious AI. A Telegram channel post by the group “KEP TEAM” marketed WolfGPT as an “upgraded version...

/ September 15, 2025 / 9 Comments
Tech Time Warp: Star Trek was not the final frontier for many tech ideas

Tech Time Warp: Star Trek was not the final frontier for many tech ideas

As ubiquitous as Star Trek is—spawning so many spin-offs and movies that only a true Trekkie could list them all off the top of their head—it’s a fun bit of trivia that the original series (known as “TOS” to fans)...

/ September 5, 2025
MSPs caught in the tug-of-war over legacy systems

MSPs caught in the tug-of-war over legacy systems

Each Labor Day, the cost of IT labor invariably becomes a topic of discussion. After all, even in the age of artificial intelligence (AI), the single biggest segment of any IT budget remains staffing. The cost incurred depends greatly on...

/ September 4, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Passwordstate emergency patch released

Cybersecurity Threat Advisory: Passwordstate emergency patch released

Click Studios has released an emergency update for Passwordstate 9.9 to address a high-severity security vulnerability. According to the changelog, the flaw could be exploited to bypass authentication. Review the details in this Cybersecurity Threat Advisory to reduce your risk...

/ September 3, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical FreePBX zero-day vulnerability

Cybersecurity Threat Advisory: Critical FreePBX zero-day vulnerability

Researchers have discovered a zero-day vulnerability in Sangoma FreePBX, identified as CVE-2025-57819. This flaw allows unauthenticated remote attackers to take control of affected PBX systems, potentially resulting in remote code execution (RCE), arbitrary database manipulation, and full system compromise. Review...

/ September 3, 2025
Back to school, back to scams part 2: Mitigation in motion

Back to school, back to scams part 2: Mitigation in motion

As students and faculty return to campuses across the nation this fall, they’re not the only ones getting back into the swing of things. Cybercriminals are also sharpening their pencils – or rather, their phishing emails and ransomware attacks –...

/ September 2, 2025
Evil-GPT
Evil-GPT: The “Enemy of ChatGPT”

Evil-GPT: The “Enemy of ChatGPT”

In the ever-evolving landscape of cybercrime, one tool has emerged as a particularly insidious player: Evil-GPT. Marketed on hacker forums on the dark web as the “ultimate enemy of ChatGPT” and the “best alternative to WormGPT,” this malicious artificial intelligence...

/ September 1, 2025
Tech Time Warp
Tech Time Warp: The lovable and luggable Compaq Portable

Tech Time Warp: The lovable and luggable Compaq Portable

August 27 marked the 32nd anniversary of the release of the Compaq Presario. This was a family of PCs that included a monitor, a modem, and, for many, their first America Online CD-ROM. Learn more in this edition of Tech...

/ August 29, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Citrix has issued patches for three zero-day vulnerabilities affecting NetScaler ADC and Gateway, including one that attackers have already begun exploiting. Review the details in this Cybersecurity Threat Advisory to reduce your risk from these threats. What is the threat?...

/ August 28, 2025
Data center
Data center drought: MSPs scramble for capacity

Data center drought: MSPs scramble for capacity

In the months and years ahead, many IT leaders will urgently turn to managed service providers (MSPs) to help them find IT infrastructure resources to run their workloads. An analysis of the data center colocation market was published by JLL,...

/ August 28, 2025