Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

A critical remote code execution (RCE) vulnerability in Microsoft SharePoint caused by the deserialization of untrusted data has been discovered. Authentication is not required by attackers on unprotected systems. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 23, 2026
Tech Time Warp: FBI releases its first warning about a computer virus

Tech Time Warp: FBI releases its first warning about a computer virus

Twenty-six years ago, on March 28, 1999, the FBI took a historic step: Its National Infrastructure Protection Center (NIPC) issued its first warning about a computer virus. The NIPC had “received reports of significant network degradation and email outages,” and...

/ March 20, 2026
The talent strategy behind the most profitable IT service providers

The talent strategy behind the most profitable IT service providers

A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...

/ March 19, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Threat actors are actively exploiting CVE‑2026‑24858 to log into FortiOS and other Fortinet products via FortiCloud SSO (when enabled), create persistent local admin accounts, and steal device configuration files. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 18, 2026
Why information security matters more than ever

Why information security matters more than ever

It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...

/ March 18, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...

/ March 18, 2026
The quiet comeback of credential-based attacks

The quiet comeback of credential-based attacks

Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...

/ March 17, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...

/ March 16, 2026
How AI and automation are redefining the MSP value proposition

How AI and automation are redefining the MSP value proposition

Key takeaways AI and automation are shifting MSPs from reactive problem-solvers to proactive, predictive partners who anticipate customer needs. Embedding next‑generation technologies into service delivery improves efficiency, reduces manual workload, and frees teams to focus on strategic initiatives. AI‑driven insights...

/ March 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Recently, two important‑level severity vulnerabilities were identified in Apache ZooKeeper, a service widely used for configuration management and naming in distributed applications. These issues make timely security updates critical. The vulnerabilities could allow attackers to access sensitive configuration data or...

/ March 13, 2026