Category: Featured
Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels
An advanced persistent threat (APT) group, Stately Taurus, has been exploiting a vulnerability in Visual Studio Code (VSCode) tunnels to maintain persistent remote access in compromised systems. Review the details in this Cybersecurity Threat Advisory to secure your environment. What...
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise
The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...
Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability
A critical vulnerability, identified as CVE-2024-50623, has been discovered in Cleo’s file transfer software suite. This vulnerability allows attackers to exploit an unrestricted file upload and download flaw, potentially leading to remote code execution (RCE) on vulnerable systems. Continue reading...
Tech Time Warp: Recording industry takes on file-sharing pioneer Napster
Twenty-five years ago, a generation of college students hit the jackpot when it came to music. They moved to college dormitories with ethernet connections just as Shawn Fanning and Sean Parker launched Napster, the first mainstream peer-to-peer file-sharing service. Or,...
Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for
Vulnerabilities were discovered in SonicWall NetExtender, CVE-2024-29014, and Palo Alto GlobalConnect, CVE-2024-5921, which can lead to remote code execution (RCE). Continue reading this Cybersecurity Threat Advisory to limit your exposure to these vulnerabilities. What is the threat? The vulnerabilities exhibit...
Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability
Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. Review this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...
7 cybersecurity trends highlighting the case for managed XDR
As the digital threat landscape becomes increasingly sophisticated, managed service providers (MSPs) face mounting pressure to adapt their cybersecurity offerings. One of the most effective solutions available today is managed extended detection and response (XDR). This approach integrates multiple layers...
Threat Spotlight: Phishing techniques to look out for in 2025
Over the last few months, Barracuda’s threat analysts have reported on several advanced phishing techniques implemented by attackers to evade security controls and make malicious emails look more convincing, legitimate, and personal. In this blog post, we look at how these and...
Getting the basics right for MSPs
I’ve given up counting the number of managed services providers (MSPs) websites where I have looked at the “Home” and “About” pages and still wondered just what the company does. Bland statements that cover the same sort of things that...
