Category: Featured

DarkBard
DarkBard: The “evil twin” of Google Bard

DarkBard: The “evil twin” of Google Bard

In the shadowy realm of cybercrime, DarkBard has emerged as a significant player, representing a crossover into non-OpenAI territory. As its name suggests, DarkBard is modeled as the dark counterpart to Google’s Bard artificial intelligence (AI). This tool surfaced in...

/ September 22, 2025 / 6 Comments
Tech Time Warp
Tech Time Warp: Meet ERMA, the machine that automated check processing

Tech Time Warp: Meet ERMA, the machine that automated check processing

When did you last write a check? In July 2024, Target became the latest retailer to stop accepting checks, citing “extremely low volumes” of customers paying by check. Use of checks — already declining before the COVID-19 pandemic — took...

/ September 19, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical WatchGuard firewall flaw

Cybersecurity Threat Advisory: Critical WatchGuard firewall flaw

A critical remote-code execution (RCE) vulnerability in WatchGuard Firebox, tracked as CVE-2025-9242 with a CVSS score of 9.3, allows unauthenticated attackers to execute arbitrary code. Review the information in this Cybersecurity Threat Advisory to learn more. What is the threat?...

/ September 19, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Worm outbreak infects npm ecosystem

Cybersecurity Threat Advisory: Worm outbreak infects npm ecosystem

Threat actors launched a sophisticated software supply chain attack that targets the npm registry and compromises over 40 packages maintained by multiple developers. The self-replicating worm, dubbed “Shai-Hulud”, automates the infection of downstream dependencies. Review the details in this Cybersecurity...

/ September 19, 2025
VMware
MSPs take center stage in Broadcom’s VMware strategy

MSPs take center stage in Broadcom’s VMware strategy

After an initial spate of controversy surrounding the Broadcom acquisition of VMware, it appears the company is now counting on partners to help organizations that have licensed the VMware Cloud Foundation (VCF) platform to help install it. VCF surges as...

/ September 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical flaw in DELMIA Apriso MOM software

Cybersecurity Threat Advisory: Critical flaw in DELMIA Apriso MOM software

CISA has added CVE-2025-5086, a critical remote code execution (RCE) vulnerability in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, to its catalog following confirmed active exploitation. Review the details of this Cybersecurity Threat Advisory to keep your system...

/ September 18, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Adobe Commerce flaw

Cybersecurity Threat Advisory: Critical Adobe Commerce flaw

A critical security vulnerability, tracked as CVE-2025-54236 (with a CVSS score of 9.1) is also known as “SessionReaper”. This vulnerability has been uncovered in Adobe Commerce and Magento Open Source. The flaw could allow cybercriminals to takeover customer accounts, putting...

/ September 17, 2025
cybersecurity
The simplicity advantage: Why consolidating cybersecurity pays off

The simplicity advantage: Why consolidating cybersecurity pays off

The cybersecurity landscape has reached a tipping point. While organizations continue to add new security tools to address emerging threats, they’re discovering that more tools often means more problems.  This guide examines the costs of managing multiple security tools. It...

/ September 17, 2025
MSP security in the age of supply chain attacks

MSP security in the age of supply chain attacks

The numbers paint a stark picture of an escalating threat landscape. Supply chain attacks have been occurring at twice their long-term average in recent months, with Cyble researchers observing over 30 such attacks in April 2025 alone. Supply chain attacks...

/ September 16, 2025
Tip Tuesday
Tip Tuesday: How to discover and manage shadow IT in your RMM

Tip Tuesday: How to discover and manage shadow IT in your RMM

Before you can manage shadow information technology (IT), you must find it. Your remote monitoring and management (RMM) platform can help you identify it, assess its potential impact, and enforce policies to govern its use. Learn what you can do...

/ September 16, 2025