Category: Featured
MSPs must place training bets carefully
There has always been a fine line between when an emerging IT platform creates enough demand for managed services and when it essentially becomes a commodity that most internal IT teams can manage on their own. Timing that transition is...
Cybersecurity Threat Advisory: New Cisco vulnerabilities discovered
Cisco is warning of five new Catalyst SD-WAN Manager product vulnerabilities. The most critical vulnerability allows unauthorized remote access to the server. Multiple vulnerabilities were discovered in SD-WAN Manager that allows an attacker to access the compromised instance or cause...
Cybersecurity Threat Advisory: WS_FTP Server vulnerabilities uncovered
Multiple vulnerabilities have been found in all versions of WS_FTP Server. The critical and high vulnerabilities include a directory traversal flaw (CVE-2023-42657) with a CVSS score of 9.9, a high-severity reflected cross-site scripting (XSS) issue (CVE-2023-40045, CVSS 8.3), a SQL...
Tech Time Warp: Spilling the tea about HotJava
In the mid-1990s, when early internet users were first exposed to the online world via AOL CD-ROMs, websites were static places. You could find text, graphics, and some choppy audio and video. But that was about to change with the...
Cybersecurity Threat Advisory: New Microsoft Word vulnerability
A new Microsoft Word vulnerability, CVE-2023-36761, was disclosed by Microsoft. This new vulnerability is rated 5.3 by NIST, a medium-level vulnerability but Microsoft has rated this as “Important”. Barracuda MSP recommends reviewing this Cybersecurity Threat Advisory in detail and follow...
Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities
Apple has released more security patches after three zero-day vulnerabilities were discovered in iOS, iPadOS, MacOS, WatchOS, and Safari. These vulnerabilities are actively being exploited in the wild against several frameworks and systems of Apple products, making sixteen total zero-days...
Current IT monitoring approaches lead to MSP opportunity
As environments become more complex, the level of satisfaction with existing approaches to IT monitoring is declining. A survey of 500 IT leaders conducted by Method Research on behalf of LogicMonitor finds nearly half of respondents (46 percent) have negative...
Cybersecurity Threat Advisory: Threat actor targets government
This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing...
Cybersecurity Threat Advisory: Critical security patches for GitLab
This Cybersecurity Threat Advisory highlights GitLab’s recent critical vulnerability, which security update have been released for. A successful exploitation can allow threat actors to mask themselves as other users during scheduled security scans while they run automated tasks (also known...
Tech Time Warp: History of the first case of ransomware
In this week’s Tech Time Warp, we look at the recent cybersecurity news out of Las Vegas sounds like something from Ocean’s 11, no matter whether your taste runs to Frank Sinatra or George Clooney: two of the world’s largest...