Category: Featured
Tech Time Warp: Apple releases the revolutionary iPod
Before the iPhone, there was the iPod. On Oct. 23, 2001, Steve Jobs introduced the iPod to a small audience—nothing like the Apple release events of later years. But then, Apple was not the juggernaut in 2001 that it is...
MSP growth is expected to soar through 2032
The overall size of the global managed services market will be somewhere between $468.7 and $520.54 billion by 2032, depending on which market forecast you prefer. This represents a roughly 8 percent compounded annual growth rate (CAGR). While both Research...
The rise of AI-based BEC attacks
Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...
Cybersecurity Threat Advisory: Phishing campaign spreading Remcos RAT malware
A new phishing campaign spreading a fileless variant of Remcos RAT malware has been discovered. Read this Cybersecurity Threat Advisory to learn how this could impact your organization. What is the threat? This campaign delivers malware through a phishing email...
Cybersecurity Threat Advisory: Palo Alto PAN-OS RCE vulnerability
A threat advisory was issued to Palo Alto customers notifying them of a vulnerability in the PAN-OS interface that can lead to remote code execution (RCE). Read this Cybersecurity Threat Advisory for the best practices to securing the PAN-OS management...
Pioneers in Tech: Fred Begay, the first Navajo to earn a PhD in physics
Native American Heritage Month, celebrated annually in November, provides an opportunity to examine and recognize the work of indigenous peoples in technology history. One of these Pioneers in Tech is Fred Begay, the first Navajo to earn a PhD in physics....
Cybersecurity Threat Advisory: Okta username flaw
Researchers have discovered a critical vulnerability in Okta which allows an user to authenticate to an account with a username longer than 52 characters without multi-factor authentication (MFA) enabled. Read this Cybersecurity Threat Advisory to learn how this may impact...
Ask an MSP Expert: How can pentesting add value to an MSP security service offering?
In today’s cybersecurity landscape, many MSPs are looking to add penetration testing (pentesting) to their service offering. Pentesting is a simulated cyberattack on a system, network, or application to find vulnerabilities before real hackers can exploit them. It helps organizations...
Cybersecurity Threat Advisory: CRON#TRAP phishing campaign
A new phishing campaign, identified as CRON#TRAP, are targeting Windows systems with a preloaded Linux virtual machine (VM) to evade detection to conduct malicious acts. Continue reading this Cybersecurity Threat Advisory to learn how to protect against this phishing campaign....