Category: Featured
Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE
A critical remote code execution (RCE) vulnerability in Microsoft SharePoint caused by the deserialization of untrusted data has been discovered. Authentication is not required by attackers on unprotected systems. Review the Cybersecurity Threat Advisory now to protect you and your...
Tech Time Warp: FBI releases its first warning about a computer virus
Twenty-six years ago, on March 28, 1999, the FBI took a historic step: Its National Infrastructure Protection Center (NIPC) issued its first warning about a computer virus. The NIPC had “received reports of significant network degradation and email outages,” and...
The talent strategy behind the most profitable IT service providers
A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...
Cybersecurity Threat Advisory: FortiCloud SSO exploitation
Threat actors are actively exploiting CVE‑2026‑24858 to log into FortiOS and other Fortinet products via FortiCloud SSO (when enabled), create persistent local admin accounts, and steal device configuration files. Review the Cybersecurity Threat Advisory now to protect you and your...
Why information security matters more than ever
It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...
Cybersecurity Threat Advisory: Critical Veeam Backup flaws
Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...
The quiet comeback of credential-based attacks
Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique
A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...
How AI and automation are redefining the MSP value proposition
Key takeaways AI and automation are shifting MSPs from reactive problem-solvers to proactive, predictive partners who anticipate customer needs. Embedding next‑generation technologies into service delivery improves efficiency, reduces manual workload, and frees teams to focus on strategic initiatives. AI‑driven insights...
Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability
Recently, two important‑level severity vulnerabilities were identified in Apache ZooKeeper, a service widely used for configuration management and naming in distributed applications. These issues make timely security updates critical. The vulnerabilities could allow attackers to access sensitive configuration data or...
