Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active Microsoft 365 ‘Direct Send’ exploitation

Cybersecurity Threat Advisory: Active Microsoft 365 ‘Direct Send’ exploitation

Security researchers have identified an active phishing campaign that exploits Microsoft 365’s “Direct Send” feature to bypass email security controls. This tactic allows attackers to deliver malicious emails that appear to originate from internal users. Continue reading this Cybersecurity Threat...

/ July 30, 2025
Partner Spotlight: Innovative solutions for modern cyberthreats

Partner Spotlight: Innovative solutions for modern cyberthreats

With cyberthreats increasingly targeting clients in the architecture, engineering, and construction (AEC) sector, managed services provider (MSP) Advance2000 knew it needed a smarter, more robust way to protect them. Headquartered in Buffalo, NY, with additional offices in Canada and Romania, Advance2000...

/ July 30, 2025
Quantum
The quantum horizon: Why MSPs must start preparing now

The quantum horizon: Why MSPs must start preparing now

Remember all the major disruptions over the years? The advent of client/server computing, thin clients, virtualization, everything-as-a-service, and most recently artificial intelligence (AI). Now, the early whispers of quantum computing has surfaced. These are just some of the many new...

/ July 30, 2025
CISA alerts: Why they belong on every MSP’s watchlist

CISA alerts: Why they belong on every MSP’s watchlist

Last week, we looked at how cybercriminals ramp up their activity during the summer months. As pool parties and vacation plans start, so do escalating cybersecurity alerts from both CISA and the Canadian Centre for Cyber Security. With organizations running...

/ July 29, 2025
Email Threat Radar – July 2025

Email Threat Radar – July 2025

In this month’s edition of the Email Threat Radar, Barracuda threat analysts identified several notable email-based threats targeting organizations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for...

/ July 28, 2025
Tech Time Warp
Tech Time Warp: Slicing into the history of CT scans

Tech Time Warp: Slicing into the history of CT scans

A CT scan is so commonplace no one thinks twice about it anymore—but, as with all things technology, we really should. Take a look at the history behind CT scans in this edition of Tech Time Warp. Forty-two years ago,...

/ July 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability in Google’s Gemini for Workspace

Cybersecurity Threat Advisory: Vulnerability in Google’s Gemini for Workspace

A newly discovered vulnerability in Google’s Gemini for Workspace allows attackers to manipulate artificial intelligence (AI)-generated email summaries. Threat actors embed concealed instructions in seemingly benign emails to bypass traditional email security. Review the details within this Cybersecurity Threat Advisory...

/ July 24, 2025
Survey: MSPs play a pivotal role to organizations’ cloud success

Survey: MSPs play a pivotal role to organizations’ cloud success

A survey of over 280 IT leaders from organizations in the U.S. and Europe, each generating over $200 million in annual revenue, reveals that 57 percent expect to increase their reliance on managed service providers (MSPs) for managing, governing, and...

/ July 24, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CrushFTP zero-day vulnerability

Cybersecurity Threat Advisory: CrushFTP zero-day vulnerability

CrushFTP has disclosed a new critical vulnerability, CVE-2025-54309, which is currently being exploited in the wild. One indicator of compromise is a “last_logins” value set for internal default accounts. Review the details in this Cybersecurity Threat Advisory to help minimize...

/ July 23, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer

Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer

Security researchers have uncovered a new attack method known as “FileFix,” which exploits Windows File Explorer to execute stealthy PowerShell commands. By abusing legitimate Windows functionality, attackers can run malicious code while evading traditional security controls. Read this Cybersecurity Threat...

/ July 19, 2025