Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Telnet authentication bypass flaw

Cybersecurity Threat Advisory: Telnet authentication bypass flaw

A critical security vulnerability has been identified in the GNU InetUtils Telnet daemon (telnetd) that allows unauthenticated attackers to obtain root-level access. The issue was introduced in 2015 and went undetected for nearly 11 years. Review this Cybersecurity Threat Advisory...

/ January 26, 2026
8 cybersecurity predictions for 2026: Barracuda leaders share their insights

8 cybersecurity predictions for 2026: Barracuda leaders share their insights

As we head into 2026, cybersecurity is changing faster than ever — thanks to big leaps in artificial intelligence, increasingly complex regulatory requirements and mounting pressure on critical infrastructure. To help organizations navigate these changes, three Barracuda executives share their top...

/ January 26, 2026 / 6 Comments
Tech Time Warp: Remembering the Brain virus, 40 years later

Tech Time Warp: Remembering the Brain virus, 40 years later

Revenge is a dish best served … via floppy disk? Forty years ago, two Pakistani brothers proved the floppy disk was a highly effective response to wrongdoing. Reports of the first PC virus, “Brain,” began circulating in January 1986. The...

/ January 23, 2026
Report shows slower MSP contract growth heading into 2026

Report shows slower MSP contract growth heading into 2026

The latest report from the Information Services Group (ISG) finds that global demand for managed services slowed in the fourth quarter, marking the second consecutive quarter of year-over-year decline in the value of large contracts. Contract growth shows signs of...

/ January 23, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: DLL sideloading backdoors via LinkedIn messages

Cybersecurity Threat Advisory: DLL sideloading backdoors via LinkedIn messages

A multi‑faceted phishing campaign is using LinkedIn private messages to deliver weaponized payloads that execute through DLL sideloading. The activity involves legitimate‑looking PDFs, a malicious sideloaded DLL, a Python interpreter PE, and decoy archives. Review the recommendations in this Cybersecurity...

/ January 22, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malicious browser extension in ClickFix variant

Cybersecurity Threat Advisory: Malicious browser extension in ClickFix variant

Security researchers have uncovered an active malvertising campaign abusing a fake ad‑blocking extension that intentionally crashes Google Chrome and Microsoft Edge to trick users into executing malicious commands—a new evolution of the ClickFix technique known as “CrashFix.” Read the Cybersecurity...

/ January 21, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical DOS vulnerability in Palo Alto Networks

Cybersecurity Threat Advisory: Critical DOS vulnerability in Palo Alto Networks

Palo Alto Networks has patched a high‑severity PAN‑OS vulnerability (CVE‑2026‑0227, CVSS 7.7) that allows unauthenticated attackers to disrupt GlobalProtect VPN gateways and portals, potentially forcing affected firewalls into maintenance mode. Review this Cybersecurity Threat Advisory to protect your clients’ systems...

/ January 21, 2026
Tech Time Warp: Happy 40th birthday to the National Center for Supercomputing Applications

Tech Time Warp: Happy 40th birthday to the National Center for Supercomputing Applications

Middle age looks good on this week’s Tech Time Warp, the National Center for Supercomputing Applications at the University of Illinois. The National Science Foundation opened NCSA on Jan. 15, 1986, in response to an unsolicited proposal from eight Illinois...

/ January 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Path traversal RCE in Gogs

Cybersecurity Threat Advisory: Path traversal RCE in Gogs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed active exploitation of a critical vulnerability in the self-hosted Git service Gogs, adding it to the Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch agencies must apply mitigations or discontinue...

/ January 15, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ServiceNow AI Platform vulnerability

Cybersecurity Threat Advisory: ServiceNow AI Platform vulnerability

ServiceNow has revealed details of a critical vulnerability—now patched—in its AI Platform that could allow an unauthenticated attacker to impersonate any user and execute actions with that user’s privileges. Review this Cybersecurity Threat Advisory now to mitigate your risk and...

/ January 15, 2026