Category: Featured

Tech Time Warp
Tech Time Warp: Apple releases the revolutionary iPod

Tech Time Warp: Apple releases the revolutionary iPod

Before the iPhone, there was the iPod. On Oct. 23, 2001, Steve Jobs introduced the iPod to a small audience—nothing like the Apple release events of later years. But then, Apple was not the juggernaut in 2001 that it is...

/ November 15, 2024
CAGR
MSP growth is expected to soar through 2032

MSP growth is expected to soar through 2032

The overall size of the global managed services market will be somewhere between $468.7 and $520.54 billion by 2032, depending on which market forecast you prefer. This represents a roughly 8 percent compounded annual growth rate (CAGR). While both Research...

/ November 14, 2024
AI BEC
The rise of AI-based BEC attacks

The rise of AI-based BEC attacks

Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...

/ November 14, 2024
Zero Trust
Easily overcome Zero Trust deployment hurdles

Easily overcome Zero Trust deployment hurdles

Zero Trust Network Access (ZTNA) isn’t just a security model — it’s the future of cybersecurity. Required in many industries today, ZTNA significantly increases the security posture across the entire organization and often replaces existing VPN solutions that have been a...

/ November 13, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Phishing campaign spreading Remcos RAT malware

Cybersecurity Threat Advisory: Phishing campaign spreading Remcos RAT malware

A new phishing campaign spreading a fileless variant of Remcos RAT malware has been discovered. Read this Cybersecurity Threat Advisory to learn how this could impact your organization. What is the threat? This campaign delivers malware through a phishing email...

/ November 13, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Palo Alto PAN-OS RCE vulnerability

Cybersecurity Threat Advisory: Palo Alto PAN-OS RCE vulnerability

A threat advisory was issued to Palo Alto customers notifying them of a vulnerability in the PAN-OS interface that can lead to remote code execution (RCE). Read this Cybersecurity Threat Advisory for the best practices to securing the PAN-OS management...

/ November 13, 2024
Pioneers in Tech
Pioneers in Tech: Fred Begay, the first Navajo to earn a PhD in physics

Pioneers in Tech: Fred Begay, the first Navajo to earn a PhD in physics

Native American Heritage Month, celebrated annually in November, provides an opportunity to examine and recognize the work of indigenous peoples in technology history. One of these Pioneers in Tech is Fred Begay, the first Navajo to earn a PhD in physics....

/ November 8, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Okta username flaw

Cybersecurity Threat Advisory: Okta username flaw

Researchers have discovered a critical vulnerability in Okta which allows an user to authenticate to an account with a username longer than 52 characters without multi-factor authentication (MFA) enabled. Read this Cybersecurity Threat Advisory to learn how this may impact...

/ November 7, 2024
Ask an MSP Expert
Ask an MSP Expert: How can pentesting add value to an MSP security service offering?

Ask an MSP Expert: How can pentesting add value to an MSP security service offering?

In today’s cybersecurity landscape, many MSPs are looking to add penetration testing (pentesting) to their service offering. Pentesting is a simulated cyberattack on a system, network, or application to find vulnerabilities before real hackers can exploit them. It helps organizations...

/ November 7, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CRON#TRAP phishing campaign

Cybersecurity Threat Advisory: CRON#TRAP phishing campaign

A new phishing campaign, identified as CRON#TRAP, are targeting Windows systems with a preloaded Linux virtual machine (VM) to evade detection to conduct malicious acts.  Continue reading this Cybersecurity Threat Advisory to learn how to protect against this phishing campaign....

/ November 6, 2024