Category: Featured
Cybersecurity Threat Advisory: Zero-click flaw in Synology NAS devices
Synology, network-attached storage (NAS) maker, addressed critical security vulnerability, CVE-2024-10443, which impacts their DiskStation and BeePhotos applications. This is an unauthenticated vulnerability that can allow attackers to obtain root-level code execution on Synology NAS devices. Review the details in this...
Cybersecurity Threat Advisory: Vulnerabilities found in Microsoft Azure AI
Significant vulnerabilities in Microsoft’s Azure AI Content Safety services have been discovered. These vulnerabilities enable attackers to bypass safeguards and deploy harmful AI-generated content. Continue reading this Cybersecurity Threat Advisory to learn the implications of these flaws and which security...
GenAI FOMO plays to the strengths of MSPs
Interest in generative artificial intelligence (GenAI) remains high. However, a survey of over 250 executives shows that only 22 percent believe their organization’s data foundation is fully ready to support GenAI applications, while 53 percent think their organization is somewhat...
Beyond phishing: How cybercriminals target SMBs vs. enterprises
Security-focused managed service providers (MSPs) know that small to midsize businesses (SMBs) often take a more cavalier approach to cybersecurity than larger organizations. They often believe that because they are small and less well-known, they’re less likely to draw the...
Beyond patches and firewalls: Advanced strategies for cyberthreat defense
Threat mitigation is to managed service providers (MSPs) what preventative medicine is to doctors. In other words, threat mitigation is the first line – and often least expensive – defense against cybercriminals. Of course, some of the basic steps include...
Cybersecurity Threat Advisory: New Microsoft Windows vulnerabilities
Two new Microsoft vulnerabilities, CVE-2024-21302 and CVE-2024-38202, are impacting Windows systems. Read this Cybersecurity Threat Advisory to learn more about how these vulnerabilities can be leveraged to exploit Microsoft Windows and how to protect your systems. What is the threat?...
Tech Time Warp: Lo! Unto us the Internet is born
Amid all the breaking news this week, the internet celebrated its 55th birthday on Oct. 29. Dive into this milestone and more in this week’s edition of Tech Time Warp. On Oct. 29, 1969, two computers were first networked to...
Cybercriminals impersonate OpenAI in large-scale phishing attack
Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new...
AI monitoring: An untapped MSP opportunity
A survey of 400 IT operations professionals finds that the rise of artificial intelligence (AI) is prompting more organizations to reassess the platforms they use to monitor their IT environments. Conducted by the market research firm Vanson Bourne on behalf...
Cybersecurity Threat Advisory: SonicWall VPN vulnerability
Fog and Akira ransomware operators are exploiting a critical SonicWall SSL VPN vulnerability, CVE-2024-40766, to breach corporate networks. Continue reading this Cybersecurity Threat Advisory to learn the tactics these groups are using and how you can reduce the risk of...