Category: Featured

Cybersecurity Threat Advisory: LockBit Ransomware Threat

Cybersecurity Threat Advisory: LockBit Ransomware Threat

The LockBit ransomware group has become the top ransomware group based on its volume of attacks in recent months. They are utilizing a new phishing email tactic by disguising the malware as copyright claim and creating a bug bounty program. Once...

/ July 4, 2022
SEC cyber rules: An MSP’s pivotal role and opportunity

SEC cyber rules: An MSP’s pivotal role and opportunity

Cyberattacks against financial services companies are on the rise. In 2021, the Financial Services Information Sharing and Analysis Center (FS-ISAC) raised the cyber threat level for U.S. financial institutions from “guarded” to “elevated” three times (it typically happens just once)....

/ July 4, 2022
Are you using the right routes to market?

Are you using the right routes to market?

Being an MSP comes with its own challenges. In the early days, the main way to market was to set up a website with enough search engine optimisation terms in it that anyone looking for what you offer would find...

/ July 2, 2022
Tech Time Warp: The origin of the Oregon Trail

Tech Time Warp: The origin of the Oregon Trail

The real Oregon Trail began in Independence, Missouri, but for generations of American schoolchildren, the trail began in a Minneapolis classroom in 1971, when three student teachers combined their penchant for history with their knowledge of BASIC.

/ July 1, 2022
Key cybersecurity trends to watch in the homestretch of 2022

Key cybersecurity trends to watch in the homestretch of 2022

Believe it or not, we are now halfway through 2022. Where has the time gone? Before we know it, we’ll be talking about Thanksgiving and Christmas. But right now, let’s pause, take stock of where we’ve been and make some...

/ June 30, 2022 / 6 Comments
Cybersecurity Threat Advisory: Apple Safari arbitrary code execution vulnerability

Cybersecurity Threat Advisory: Apple Safari arbitrary code execution vulnerability

Apple has had an existing arbitrary code execution vulnerability in their MacOS, iOS, iPadOS, and Safari in their past 3 zero-days known as CVE-2022-22620. Google and Barracuda MSP researchers are making sure users don’t forget this. The vulnerability could allow...

/ June 28, 2022
Cybersecurity Threat Advisory: FastJson versions vulnerable to deserialization

Cybersecurity Threat Advisory: FastJson versions vulnerable to deserialization

A new version of FastJson has been released and has patched a vulnerability which allows malicious actors to utilize “AutoTypeCheck” mechanism and achieve remote code execution in FastJson. All Java applications that pass user-controlled data to either the JSON.parse or...

/ June 27, 2022
Tech Time Warp: Did you forget about the first iPhone?

Tech Time Warp: Did you forget about the first iPhone?

As ubiquitous as the iPhone is today (and as many competitors as it has inspired), it can be difficult to think back to June 2007, when the first iPhone went on sale. Disrupting the Blackberry world, the iPhone of 2007 was...

/ June 24, 2022
Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information,...

/ June 24, 2022
Cybersecurity Threat Advisory: A Microsoft Azure Synapse vulnerability uncovered

Cybersecurity Threat Advisory: A Microsoft Azure Synapse vulnerability uncovered

Security researchers at Orca uncovered a vulnerability in Microsoft Azure Synapse, dubbed SynLapse. This vulnerability lies in the ODBC or Online Database Connectivity method employed by Synapse. Once a bad actor gains access through this vulnerability, they can gain access...

/ June 22, 2022