Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero-click flaw in Synology NAS devices

Cybersecurity Threat Advisory: Zero-click flaw in Synology NAS devices

Synology, network-attached storage (NAS) maker, addressed critical security vulnerability,  CVE-2024-10443, which impacts their DiskStation and BeePhotos applications. This is an unauthenticated vulnerability that can allow attackers to obtain root-level code execution on Synology NAS devices. Review the details in this...

/ November 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Microsoft Azure AI

Cybersecurity Threat Advisory: Vulnerabilities found in Microsoft Azure AI

Significant vulnerabilities in Microsoft’s Azure AI Content Safety services have been discovered. These vulnerabilities enable attackers to bypass safeguards and deploy harmful AI-generated content. Continue reading this Cybersecurity Threat Advisory to learn the implications of these flaws and which security...

/ November 5, 2024
GenAI
GenAI FOMO plays to the strengths of MSPs

GenAI FOMO plays to the strengths of MSPs

Interest in generative artificial intelligence (GenAI) remains high. However, a survey of over 250 executives shows that only 22 percent believe their organization’s data foundation is fully ready to support GenAI applications, while 53 percent think their organization is somewhat...

/ November 5, 2024
cybercriminals SMBs
Beyond phishing: How cybercriminals target SMBs vs. enterprises

Beyond phishing: How cybercriminals target SMBs vs. enterprises

Security-focused managed service providers (MSPs) know that small to midsize businesses (SMBs) often take a more cavalier approach to cybersecurity than larger organizations. They often believe that because they are small and less well-known, they’re less likely to draw the...

/ November 5, 2024
Beyond patches and firewalls: Advanced strategies for cyberthreat defense

Beyond patches and firewalls: Advanced strategies for cyberthreat defense

Threat mitigation is to managed service providers (MSPs) what preventative medicine is to doctors. In other words, threat mitigation is the first line – and often least expensive – defense against cybercriminals. Of course, some of the basic steps include...

/ November 4, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Microsoft Windows vulnerabilities

Cybersecurity Threat Advisory: New Microsoft Windows vulnerabilities

Two new Microsoft vulnerabilities, CVE-2024-21302 and CVE-2024-38202, are impacting Windows systems. Read this Cybersecurity Threat Advisory to learn more about how these vulnerabilities can be leveraged to exploit Microsoft Windows and how to protect your systems. What is the threat?...

/ November 4, 2024
Tech Time Warp
Tech Time Warp: Lo! Unto us the Internet is born

Tech Time Warp: Lo! Unto us the Internet is born

Amid all the breaking news this week, the internet celebrated its 55th birthday on Oct. 29. Dive into this milestone and more in this week’s edition of Tech Time Warp. On Oct. 29, 1969, two computers were first networked to...

/ November 1, 2024
impersonate OpenAI
Cybercriminals impersonate OpenAI in large-scale phishing attack

Cybercriminals impersonate OpenAI in large-scale phishing attack

Since the launch of ChatGPT, OpenAI has sparked significant interest among both businesses and cybercriminals. While companies are increasingly concerned about whether their existing cybersecurity measures can adequately defend against threats curated with generative AI tools, attackers are finding new...

/ October 31, 2024
AI shift
AI monitoring: An untapped MSP opportunity

AI monitoring: An untapped MSP opportunity

A survey of 400 IT operations professionals finds that the rise of artificial intelligence (AI) is prompting more organizations to reassess the platforms they use to monitor their IT environments. Conducted by the market research firm Vanson Bourne on behalf...

/ October 30, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SonicWall VPN vulnerability

Cybersecurity Threat Advisory: SonicWall VPN vulnerability

Fog and Akira ransomware operators are exploiting a critical SonicWall SSL VPN vulnerability, CVE-2024-40766, to breach corporate networks. Continue reading this Cybersecurity Threat Advisory to learn the tactics these groups are using and how you can reduce the risk of...

/ October 29, 2024