Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft Exchange high-severity vulnerability

Cybersecurity Threat Advisory: Microsoft Exchange high-severity vulnerability

CVE-2025-53786 is a high-severity vulnerability affecting Microsoft Exchange servers, allowing attackers to move laterally within Microsoft cloud environments and potentially compromise entire domains. Currently, approximately 29,000 Exchange servers remain unpatched, leaving organizations exposed to significant risk. Review the information in...

/ August 13, 2025
Municipal cybersecurity: MSPs navigate the front lines of digital defense

Municipal cybersecurity: MSPs navigate the front lines of digital defense

American cities are under siege in cyberspace, and the managed service providers (MSPs) they depend on are their best hope for defense. Last week, St. Paul, Minnesota, declared a state of emergency after a “deliberate, coordinated digital attack” forced the...

/ August 12, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: WinRAR zero-day exploited

Cybersecurity Threat Advisory: WinRAR zero-day exploited

A critical path traversal zero-day vulnerability — tracked as CVE‑2025‑8088 — has been identified in WinRAR and related components (Windows RAR, UnRAR.dll, and the portable UnRAR source code), and is currently being actively exploited. Review the details in this Cybersecurity...

/ August 12, 2025
Pioneers in Tech
Pioneers in Tech: Sir Clive Sinclair, a man ahead of his time

Pioneers in Tech: Sir Clive Sinclair, a man ahead of his time

One major development in the demise of the slide rule was the release of the Sinclair Executive Electronic Pocket Calculator in August 1972. At one-third the size of its competitors, not to mention half the cost, the Sinclair Executive was...

/ August 8, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SonicWall SMA arbitrary file upload vulnerability

Cybersecurity Threat Advisory: SonicWall SMA arbitrary file upload vulnerability

Attackers are actively exploiting CVE-2025-40599, a critical vulnerability in SonicWall’s Secure Mobile Access (SMA) devices, to upload arbitrary files and gain unauthorized access. This flaw enables them to execute malicious code and compromise affected systems. The Akira ransomware group is...

/ August 8, 2025
Threat Spotlight: How attackers poison AI tools and defenses

Threat Spotlight: How attackers poison AI tools and defenses

Barracuda has reported on how generative artificial intellegence (AI) is being used to create and distribute spam emails and craft highly persuasive phishing attacks. These threats continue to evolve and escalate — but they are not the only ways in...

/ August 4, 2025 / 4 Comments
Tech Time Warp
Tech Time Warp: The TRS-80 makes its debut

Tech Time Warp: The TRS-80 makes its debut

It sounds like a joke today: A major retailer, concerned about waning interest in CB radio, decides to offer a new product line. But the retailer isn’t sure this new product line will have any staying power. Would the market...

/ August 1, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical PaperCut NG/MF CSRF flaw

Cybersecurity Threat Advisory: Critical PaperCut NG/MF CSRF flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-2533, a critical PaperCut NG/MF print management software vulnerability, to its Known Exploited Vulnerabilities (KEV) catalog. Attackers are actively exploiting this cross-site request forgery (CSRF) flaw in the wild. Review...

/ July 31, 2025
MSPs
Cloud liberation: What Microsoft’s deal with CISPE means for MSPs

Cloud liberation: What Microsoft’s deal with CISPE means for MSPs

Managed service providers (MSPs) in Europe are closely watching how a settlement between Microsoft and the Cloud Infrastructure Services Providers in Europe (CISPE) coalition will impact pricing and availability of cloud services.  Under the agreement, cloud service providers (CSPs) that are...

/ July 31, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active Microsoft 365 ‘Direct Send’ exploitation

Cybersecurity Threat Advisory: Active Microsoft 365 ‘Direct Send’ exploitation

Security researchers have identified an active phishing campaign that exploits Microsoft 365’s “Direct Send” feature to bypass email security controls. This tactic allows attackers to deliver malicious emails that appear to originate from internal users. Continue reading this Cybersecurity Threat...

/ July 30, 2025