Category: Featured
Cybersecurity Threat Advisory: Warlock (Storm-2603) exploits SmarterMail vulnerability
SmarterTools has confirmed that the Warlock ransomware group (Storm‑2603) breached its environment by exploiting an unpatched SmarterMail instance. Current intelligence indicates the same SmarterMail vulnerability is being actively used in the wild to gain initial access and deploy Warlock ransomware....
Cybersecurity Threat Advisory: Critical FortiClientEMS SQL injection vulnerability
An improper neutralization of special elements used in SQL commands in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands through specially crafted HTTP requests. This vulnerability, tracked as CVE‑2026‑21643 with a CVSS score of...
Cybersecurity Threat Advisory: Critical RCE Flaw in BeyondTrust
A critical pre-authentication remote code execution (RCE) vulnerability has been identified in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). If left unpatched, it may result in full system compromise, data loss, or service disruption. Review this Cybersecurity Threat...
Cybersecurity Threat Advisory: Supply chain attack impacting Notepad++
Last updated on February 9, 2026 with how Barracuda is helping partners and customers. A supply‑chain compromise affecting Notepad++’s official update infrastructure allowed threat actors to redirect some users to attacker‑controlled downloads, potentially leading to malware delivery and code execution...
Tech Time Warp: The unifying nature of Unix time
As this Tech Time Warp is being written, the current Unix epoch time is 1770344462. That means one billion, seven hundred seventy million, three hundred forty-four thousand, four hundred sixty-two seconds have passed since midnight GMT Jan. 1, 1970 (not...
Cybersecurity Threat Advisory: Compromised OpenVSX delivering GlassWorm malware
A new GlassWorm malware campaign is targeting macOS developer systems through compromised OpenVSX extensions. Continue reading this Cybersecurity Threat Advisory to learn more about this threat and how to protect your environment. What is the threat? A threat actor gained...
MSPs need to move beyond monitoring to embrace observability
Monitoring has long been a foundational element of any managed services portfolio. But as IT environments grow more distributed and complex, organizations now expect service providers to go further—beyond simply tracking metrics to truly observing what’s happening across their systems...
Shadow IT: A growing risk and opportunity for MSPs
MSPs already juggle a growing list of responsibilities—and that list keeps expanding while resources do not. One issue increasingly demanding attention is the rise of employees adopting tools that neither internal IT nor the MSP has approved. This concern comes...
Cybersecurity Threat Advisory: Tsundere Bot malware loader
A new malware loader, Tsundere Bot, is increasingly used by criminal Initial Access Brokers (IABs) to compromise corporate environments and pave the way for ransomware attacks. Recent public reporting links Tsundere Bot to ClickFix‑style phishing, malicious loaders delivered through user...
