Category: Featured

Back to school, back to scams part 2: Mitigation in motion

Back to school, back to scams part 2: Mitigation in motion

As students and faculty return to campuses across the nation this fall, they’re not the only ones getting back into the swing of things. Cybercriminals are also sharpening their pencils – or rather, their phishing emails and ransomware attacks –...

/ September 2, 2025
Evil-GPT
Evil-GPT: The “Enemy of ChatGPT”

Evil-GPT: The “Enemy of ChatGPT”

In the ever-evolving landscape of cybercrime, one tool has emerged as a particularly insidious player: Evil-GPT. Marketed on hacker forums on the dark web as the “ultimate enemy of ChatGPT” and the “best alternative to WormGPT,” this malicious artificial intelligence...

/ September 1, 2025
Tech Time Warp
Tech Time Warp: The lovable and luggable Compaq Portable

Tech Time Warp: The lovable and luggable Compaq Portable

August 27 marked the 32nd anniversary of the release of the Compaq Presario. This was a family of PCs that included a monitor, a modem, and, for many, their first America Online CD-ROM. Learn more in this edition of Tech...

/ August 29, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Citrix has issued patches for three zero-day vulnerabilities affecting NetScaler ADC and Gateway, including one that attackers have already begun exploiting. Review the details in this Cybersecurity Threat Advisory to reduce your risk from these threats. What is the threat?...

/ August 28, 2025
Data center
Data center drought: MSPs scramble for capacity

Data center drought: MSPs scramble for capacity

In the months and years ahead, many IT leaders will urgently turn to managed service providers (MSPs) to help them find IT infrastructure resources to run their workloads. An analysis of the data center colocation market was published by JLL,...

/ August 28, 2025
Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Let’s get straight to the point: what’s your rate of customer churn? Are you happy with it? Keep in mind that the cost of replacing every lost customer is much higher than just keeping them in the first place.  When...

/ August 27, 2025
Cyberthreats
Back to school, back to scams

Back to school, back to scams

As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their...

/ August 26, 2025
Tech Time Warp
Tech Time Warp: The history of the Computer History Museum

Tech Time Warp: The history of the Computer History Museum

It might seem a bit meta (not Meta!) for a technology history blog series to cover the history of the Computer History Museum, but the Silicon Valley institution is the mothership, and we certainly rely on its incredible web presence....

/ August 22, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities

Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities

Researchers have uncovered a chained vulnerability in SAP NetWeaver Visual Composer involving authentication bypass and insecure deserialization. These critical flaws—tracked as CVE-2025-31324 and CVE-2025-42999—are currently being exploited in an active threat campaign targeting exposed Visual Composer servers. Review the details...

/ August 20, 2025
CIRCIA
CIRCIA compliance: What MSPs need to know now

CIRCIA compliance: What MSPs need to know now

The full implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) is rapidly approaching, bringing with it a new package of rules and regulations that managed service providers (MSPs) must follow, at least those serving critical infrastructure clients....

/ August 19, 2025