Category: Featured

Back to school, back to scams part 2: Mitigation in motion
As students and faculty return to campuses across the nation this fall, they’re not the only ones getting back into the swing of things. Cybercriminals are also sharpening their pencils – or rather, their phishing emails and ransomware attacks –...

Evil-GPT: The “Enemy of ChatGPT”
In the ever-evolving landscape of cybercrime, one tool has emerged as a particularly insidious player: Evil-GPT. Marketed on hacker forums on the dark web as the “ultimate enemy of ChatGPT” and the “best alternative to WormGPT,” this malicious artificial intelligence...

Tech Time Warp: The lovable and luggable Compaq Portable
August 27 marked the 32nd anniversary of the release of the Compaq Presario. This was a family of PCs that included a monitor, a modem, and, for many, their first America Online CD-ROM. Learn more in this edition of Tech...

Cybersecurity Threat Advisory: Citrix patches NetScaler flaws
Citrix has issued patches for three zero-day vulnerabilities affecting NetScaler ADC and Gateway, including one that attackers have already begun exploiting. Review the details in this Cybersecurity Threat Advisory to reduce your risk from these threats. What is the threat?...

Data center drought: MSPs scramble for capacity
In the months and years ahead, many IT leaders will urgently turn to managed service providers (MSPs) to help them find IT infrastructure resources to run their workloads. An analysis of the data center colocation market was published by JLL,...

Churn isn’t just a number — it’s a warning sign MSPs can’t ignore
Let’s get straight to the point: what’s your rate of customer churn? Are you happy with it? Keep in mind that the cost of replacing every lost customer is much higher than just keeping them in the first place. When...

Back to school, back to scams
As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their...

Tech Time Warp: The history of the Computer History Museum
It might seem a bit meta (not Meta!) for a technology history blog series to cover the history of the Computer History Museum, but the Silicon Valley institution is the mothership, and we certainly rely on its incredible web presence....

Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities
Researchers have uncovered a chained vulnerability in SAP NetWeaver Visual Composer involving authentication bypass and insecure deserialization. These critical flaws—tracked as CVE-2025-31324 and CVE-2025-42999—are currently being exploited in an active threat campaign targeting exposed Visual Composer servers. Review the details...

CIRCIA compliance: What MSPs need to know now
The full implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) is rapidly approaching, bringing with it a new package of rules and regulations that managed service providers (MSPs) must follow, at least those serving critical infrastructure clients....