Category: Featured

Caught between a rock and a hyperscaler

Caught between a rock and a hyperscaler

Remember the good old days when certain activities—hosting email, running data analytics, and delivering reports—were strong revenue drivers? With major players like AWS, Azure, and Google Cloud Platform (GCP) entering the arena, those capabilities quickly became table stakes. Each hyperscaler...

/ November 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Oracle Identity Manager vulnerability

Cybersecurity Threat Advisory: Oracle Identity Manager vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog. Read this Cybersecurity Threat Advisory to learn about the current risk and apply relevant patches now. What...

/ November 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Fluent Bit vulnerabilities

Cybersecurity Threat Advisory: Fluent Bit vulnerabilities

Five vulnerabilities have been identified in Fluent Bit. Upon a successful exploitation, attackers could bypass authentication, perform path traversal, execute remote code, or cause denial of service. Review this Cybersecurity Threat Advisory now to secure you or your clients’ infrastructure....

/ November 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Grafana SCIM vulnerability

Cybersecurity Threat Advisory: Critical Grafana SCIM vulnerability

A critical security vulnerability in Grafana Enterprise could allow attackers to escalate privileges and impersonate users. Tracked as CVE-2025-41115, the flaw carries the maximum CVSS score of 10.0. Continue reading this Cybersecurity Threat Advisory to learn how to protect you...

/ November 25, 2025
Holiday security reset: The playbook to outpace hackers

Holiday security reset: The playbook to outpace hackers

The holidays, with their twinkling lights and swirling snow, can be a gift for hackers and a lump of coal for companies. We don’t want your cyber stocking filled with coal at Christmas, which is why we’re talking to experts...

/ November 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: 7-Zip symbolic link vulnerability

Cybersecurity Threat Advisory: 7-Zip symbolic link vulnerability

Attackers are actively exploiting a high-severity 7-Zip vulnerability, CVE-2025-11001. Attackers use malicious archives to abuse symbolic links, forcing writes outside the intended extraction directory and enabling remote code execution (RCE) when users interact. Review this Cybersecurity Threat Advisory for remediation...

/ November 25, 2025
Email Threat Radar — November 2025

Email Threat Radar — November 2025

Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organizations: New tools and tactics for the Tycoon 2FA phishing kit Invisible characters that help Cephas kit evade scanners and rules A sophisticated...

/ November 24, 2025
Tech Time Warp: A bite-sized story from Apple history — how the Macintosh got its name

Tech Time Warp: A bite-sized story from Apple history — how the Macintosh got its name

The 1984 introduction of the Macintosh computer featured the iconic and still-relevant Super Bowl commercial directed by Ridley Scott. More than 40 years later, this advertising masterpiece holds up, as does the brand it launched. Let’s dive into this week’s...

/ November 21, 2025
The AI shift: Is It time MSPs turned MIPs?

The AI shift: Is It time MSPs turned MIPs?

A Top Down Ventures report forecasts that next-generation managed service providers (MSPs) that are focused on outcomes driven by artificial intelligence (AI) agents, will enjoy 10 to 15 basis points of higher EBITA margins than their current average. The next...

/ November 20, 2025
Staying cyber safe while hackers chase holiday cheer

Staying cyber safe while hackers chase holiday cheer

The holidays are almost upon us. That means pass the stuffing, brine the turkey, wrap the presents, and hang the stockings with care. It also means hackers are hiding in the holly, waiting for a moment of distraction from all...

/ November 19, 2025