Category: Featured

Cybersecurity Threat Advisory: Active Microsoft 365 ‘Direct Send’ exploitation
Security researchers have identified an active phishing campaign that exploits Microsoft 365’s “Direct Send” feature to bypass email security controls. This tactic allows attackers to deliver malicious emails that appear to originate from internal users. Continue reading this Cybersecurity Threat...

The quantum horizon: Why MSPs must start preparing now
Remember all the major disruptions over the years? The advent of client/server computing, thin clients, virtualization, everything-as-a-service, and most recently artificial intelligence (AI). Now, the early whispers of quantum computing has surfaced. These are just some of the many new...

CISA alerts: Why they belong on every MSP’s watchlist
Last week, we looked at how cybercriminals ramp up their activity during the summer months. As pool parties and vacation plans start, so do escalating cybersecurity alerts from both CISA and the Canadian Centre for Cyber Security. With organizations running...

Tech Time Warp: Slicing into the history of CT scans
A CT scan is so commonplace no one thinks twice about it anymore—but, as with all things technology, we really should. Take a look at the history behind CT scans in this edition of Tech Time Warp. Forty-two years ago,...

Survey: MSPs play a pivotal role to organizations’ cloud success
A survey of over 280 IT leaders from organizations in the U.S. and Europe, each generating over $200 million in annual revenue, reveals that 57 percent expect to increase their reliance on managed service providers (MSPs) for managing, governing, and...

Cybersecurity Threat Advisory: CrushFTP zero-day vulnerability
CrushFTP has disclosed a new critical vulnerability, CVE-2025-54309, which is currently being exploited in the wild. One indicator of compromise is a “last_logins” value set for internal default accounts. Review the details in this Cybersecurity Threat Advisory to help minimize...

Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer
Security researchers have uncovered a new attack method known as “FileFix,” which exploits Windows File Explorer to execute stealthy PowerShell commands. By abusing legitimate Windows functionality, attackers can run malicious code while evading traditional security controls. Read this Cybersecurity Threat...