Category: Featured

Pioneers in Tech: Marian Croak, an “American idol” with 200 patents
Readers of a certain age will remember the frustration of trying to dial in their votes for Kelly Clarkson during the first season of American Idol. The phone lines would become overloaded! Most of us dialing in for Kelly probably...

Cybersecurity Threat Advisory: Critical Azure vulnerabilities
Microsoft revealed two critical vulnerabilities in Microsoft Azure AI Face Service, a cloud-based facial recognition tool. They enable attackers to bypass authentication. Review the details within this Cybersecurity Threat Advisory to discover the key steps to safeguard your environment. What...

Cybersecurity Threat Advisory: Microsoft SharePoint connector vulnerability
A critical security vulnerability was identified in Microsoft Power Platform’s SharePoint connector. The flaw allows attackers to harvest user credentials and perform unauthorized actions within the platform upon a successful exploitation. Continue reading this Cybersecurity Threat Advisory to learn how...

Boost cybersecurity audits: A guide for smaller MSPs
Cybersecurity is becoming an essential component of the services that managed service providers (MSPs) offer, and security audits are an important tool for MSPs of all sizes. Larger MSPs benefit from a deeper bench of personnel and products when conducting...

Elevate your services: Integrating compliance into offerings
As a managed service provider (MSP), your clients count on you for all their IT and cybersecurity needs—and that includes compliance. Being able to deliver compliance services is more than just a value-add; it can give MSPs a competitive edge...

Cybersecurity Threat Advisory: MintsLoader campaign threat
A cyber campaign has been identified using the MintsLoader malware loader to deliver secondary payloads, such as the StealC information stealer and the legitimate open-source network computing platform, BOINC. This campaign has primarily targeted sectors such as electricity, oil and...

Tech Time Warp: Java programming language is a thirtysomething
The programming language that made “Write Once, Read Anywhere” (WORA) a standard turns 34 this year (or 30, depending on which anniversary you’re counting). Learn about the history behind Java programming language in this edition of Tech Time Warp. The...

Cloud computing expertise in high demand for 2025
Despite the spike in demand for cloud computing services in 2024, consumption is expected to increase further as organizations head into 2025. This growth is mainly driven by the rise of artificial intelligence (AI) applications. A report from Synergy Research...

Cybersecurity Threat Advisory: Ransomware attacks on ESXi systems
New ransomware attacks were discovered targeting ESXi systems that use stealthy SSH tunnels to direct traffic to command-and-control (C2) infrastructure, enabling attackers to remain undetected. Continue reading this Cybersecurity Threat Advisory to discover the key steps to safeguard your environment....