Category: Featured
Caught between a rock and a hyperscaler
Remember the good old days when certain activities—hosting email, running data analytics, and delivering reports—were strong revenue drivers? With major players like AWS, Azure, and Google Cloud Platform (GCP) entering the arena, those capabilities quickly became table stakes. Each hyperscaler...
Cybersecurity Threat Advisory: Oracle Identity Manager vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog. Read this Cybersecurity Threat Advisory to learn about the current risk and apply relevant patches now. What...
Cybersecurity Threat Advisory: Fluent Bit vulnerabilities
Five vulnerabilities have been identified in Fluent Bit. Upon a successful exploitation, attackers could bypass authentication, perform path traversal, execute remote code, or cause denial of service. Review this Cybersecurity Threat Advisory now to secure you or your clients’ infrastructure....
Cybersecurity Threat Advisory: Critical Grafana SCIM vulnerability
A critical security vulnerability in Grafana Enterprise could allow attackers to escalate privileges and impersonate users. Tracked as CVE-2025-41115, the flaw carries the maximum CVSS score of 10.0. Continue reading this Cybersecurity Threat Advisory to learn how to protect you...
Holiday security reset: The playbook to outpace hackers
The holidays, with their twinkling lights and swirling snow, can be a gift for hackers and a lump of coal for companies. We don’t want your cyber stocking filled with coal at Christmas, which is why we’re talking to experts...
Cybersecurity Threat Advisory: 7-Zip symbolic link vulnerability
Attackers are actively exploiting a high-severity 7-Zip vulnerability, CVE-2025-11001. Attackers use malicious archives to abuse symbolic links, forcing writes outside the intended extraction directory and enabling remote code execution (RCE) when users interact. Review this Cybersecurity Threat Advisory for remediation...
Tech Time Warp: A bite-sized story from Apple history — how the Macintosh got its name
The 1984 introduction of the Macintosh computer featured the iconic and still-relevant Super Bowl commercial directed by Ridley Scott. More than 40 years later, this advertising masterpiece holds up, as does the brand it launched. Let’s dive into this week’s...
The AI shift: Is It time MSPs turned MIPs?
A Top Down Ventures report forecasts that next-generation managed service providers (MSPs) that are focused on outcomes driven by artificial intelligence (AI) agents, will enjoy 10 to 15 basis points of higher EBITA margins than their current average. The next...
Staying cyber safe while hackers chase holiday cheer
The holidays are almost upon us. That means pass the stuffing, brine the turkey, wrap the presents, and hang the stockings with care. It also means hackers are hiding in the holly, waiting for a moment of distraction from all...
