Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels

Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels

An advanced persistent threat (APT) group, Stately Taurus, has been exploiting a vulnerability in Visual Studio Code (VSCode) tunnels to maintain persistent remote access in compromised systems. Review the details in this Cybersecurity Threat Advisory to secure your environment. What...

/ December 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...

/ December 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability

Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability

A critical vulnerability, identified as CVE-2024-50623, has been discovered in Cleo’s file transfer software suite. This vulnerability allows attackers to exploit an unrestricted file upload and download flaw, potentially leading to remote code execution (RCE) on vulnerable systems. Continue reading...

/ December 10, 2024
ad hoc
Securing ad hoc networks: Essential strategies for MSPs

Securing ad hoc networks: Essential strategies for MSPs

When Hurricane Helene tore a path of destruction from the Gulf Coast to the North Carolina mountains during the summer of 2024, cell phone towers were toppled, and internet service was knocked out. However, emergency responders were not left completely...

/ December 10, 2024
Tech Time Warp
Tech Time Warp: Recording industry takes on file-sharing pioneer Napster

Tech Time Warp: Recording industry takes on file-sharing pioneer Napster

Twenty-five years ago, a generation of college students hit the jackpot when it came to music. They moved to college dormitories with ethernet connections just as Shawn Fanning and Sean Parker launched Napster, the first mainstream peer-to-peer file-sharing service. Or,...

/ December 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Vulnerabilities were discovered in SonicWall NetExtender, CVE-2024-29014, and Palo Alto GlobalConnect, CVE-2024-5921, which can lead to remote code execution (RCE). Continue reading this Cybersecurity Threat Advisory to limit your exposure to these vulnerabilities. What is the threat? The vulnerabilities exhibit...

/ December 5, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. Review this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ December 5, 2024
managed XDR
7 cybersecurity trends highlighting the case for managed XDR

7 cybersecurity trends highlighting the case for managed XDR

As the digital threat landscape becomes increasingly sophisticated, managed service providers (MSPs) face mounting pressure to adapt their cybersecurity offerings. One of the most effective solutions available today is managed extended detection and response (XDR). This approach integrates multiple layers...

/ December 5, 2024
Predicts
Threat Spotlight: Phishing techniques to look out for in 2025

Threat Spotlight: Phishing techniques to look out for in 2025

Over the last few months, Barracuda’s threat analysts have reported on several advanced phishing techniques implemented by attackers to evade security controls and make malicious emails look more convincing, legitimate, and personal. In this blog post, we look at how these and...

/ December 4, 2024
BaaS
Getting the basics right for MSPs

Getting the basics right for MSPs

I’ve given up counting the number of managed services providers (MSPs) websites where I have looked at the “Home” and “About” pages and still wondered just what the company does. Bland statements that cover the same sort of things that...

/ December 3, 2024