Category: Featured
Cybersecurity Threat Advisory: ServiceNow AI Platform vulnerability
ServiceNow has revealed details of a critical vulnerability—now patched—in its AI Platform that could allow an unauthenticated attacker to impersonate any user and execute actions with that user’s privileges. Review this Cybersecurity Threat Advisory now to mitigate your risk and...
Keeping pace in 2026: MSP essentials for success
Welcome to 2026. Are you excited to leave 2025 behind and embrace new opportunities, or do you feel apprehensive as uncertainties loom on the horizon? One thing is certain: 2026 will be challenging. The rapid pace of change—especially in AI—means...
Cybersecurity Threat Advisory: Urgent patch for Trend Micro RCE flaw
Trend Micro has released security updates addressing multiple vulnerabilities in on-premises versions of Apex Central. The most critical issue, CVE-2025-69258 with a CVSS score of 9.8, is a remote code execution vulnerability in LoadLibraryEX. Two other vulnerabilities, CVE-2025-69259 with a...
Tip Tuesday: How to perform a compliance gap analysis for your MSP clients
Compliance gap analysis is a strategic tool that reduces risk across your client’s environments. By identifying where actual practices fall short of regulatory or contractual standards, you get a clearer picture of their operational vulnerabilities. These gaps often point to...
Cybersecurity Threat Advisory: Unauthenticated RCE vulnerability in n8n
A severe unauthenticated remote code execution (RCE) vulnerability nicknamed “Ni8mare” has been discovered in the n8n workflow automation platform. This flaw, tracked as CVE-2026-21858, allows attackers to take full control of vulnerable n8n instances without needing credentials. Read this Cybersecurity Threat...
Threat Spotlight: How phishing kits evolved in 2025
In 2025, 90 percent of high-volume phishing campaigns leveraged Phishing-as-a-Service (PhaaS) kits. These kits have transformed the phishing landscape, enabling even less-skilled cybercriminals to access advanced tools and automation and launch large-scale, targeted phishing campaigns, often impersonating legitimate services and...
Pioneers in Tech: Sandra Bullock, Academy award winner, actress, producer, internet pioneer
Your socials may have been buzzing in the past few days with an exciting bit of resurfaced news. One of America’s most popular actresses—known for her girl-next-door persona and rise to stardom in the 1990s—is also a pioneer in technology....
Cybersecurity in 2026: Experts predict what’s next
Over the past two weeks, we’ve reflected on 2025’s cybersecurity developments—with a few glimpses into 2026. Today, we turn our full attention to the year ahead, sharing predictions from leading experts on what’s next for cybersecurity. AI will elevate phishing...
Mergers and acquisitions: Disruptions and opportunities for MSPs
Few business events are as challenging as a merger or acquisition. Even with the best intentions, outcomes rarely align perfectly with expectations. For managed service providers (MSPs), these transactions can create significant uncertainty—but also open doors to new opportunities. Three...
If you’re an MSP owner who wants more consistent leads, start here
As someone who’s spent the last 8+ years helping hundreds of MSPs generate leads and book real sales conversations, I hear the same frustration over and over again: “We’re doing some marketing… but leads are inconsistent.” Some months are busy. ...
