Category: Featured

Tech Time Warp
Tech Time Warp: Happy Birthday to pioneer in tech, Grace Hopper

Tech Time Warp: Happy Birthday to pioneer in tech, Grace Hopper

Admiral Grace Hopper, one of the most legendary early females in the computer industry, would have celebrated her 118th birthday on December 9. Born in New York City in 1906, Hopper built a career in the U.S. Navy and computer...

/ December 13, 2024
AWS
AWS updates creating new opportunities for partners

AWS updates creating new opportunities for partners

Amazon Web Services (AWS) now offers four additional security certifications to help solution providers drive the adoption of additional solutions in collaboration with technology alliance partners such as Barracuda Networks. Part of its Competency programs for security certifications include artificial...

/ December 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels

Cybersecurity Threat Advisory: Active exploitation of VSCode tunnels

An advanced persistent threat (APT) group, Stately Taurus, has been exploiting a vulnerability in Visual Studio Code (VSCode) tunnels to maintain persistent remote access in compromised systems. Review the details in this Cybersecurity Threat Advisory to secure your environment. What...

/ December 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

Cybersecurity Threat Advisory: Socks5Systemz botnet compromise

The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...

/ December 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability

Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability

A critical vulnerability, identified as CVE-2024-50623, has been discovered in Cleo’s file transfer software suite. This vulnerability allows attackers to exploit an unrestricted file upload and download flaw, potentially leading to remote code execution (RCE) on vulnerable systems. Continue reading...

/ December 10, 2024
ad hoc
Securing ad hoc networks: Essential strategies for MSPs

Securing ad hoc networks: Essential strategies for MSPs

When Hurricane Helene tore a path of destruction from the Gulf Coast to the North Carolina mountains during the summer of 2024, cell phone towers were toppled, and internet service was knocked out. However, emergency responders were not left completely...

/ December 10, 2024
Tech Time Warp
Tech Time Warp: Recording industry takes on file-sharing pioneer Napster

Tech Time Warp: Recording industry takes on file-sharing pioneer Napster

Twenty-five years ago, a generation of college students hit the jackpot when it came to music. They moved to college dormitories with ethernet connections just as Shawn Fanning and Sean Parker launched Napster, the first mainstream peer-to-peer file-sharing service. Or,...

/ December 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Vulnerabilities were discovered in SonicWall NetExtender, CVE-2024-29014, and Palo Alto GlobalConnect, CVE-2024-5921, which can lead to remote code execution (RCE). Continue reading this Cybersecurity Threat Advisory to limit your exposure to these vulnerabilities. What is the threat? The vulnerabilities exhibit...

/ December 5, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. Review this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ December 5, 2024
managed XDR
7 cybersecurity trends highlighting the case for managed XDR

7 cybersecurity trends highlighting the case for managed XDR

As the digital threat landscape becomes increasingly sophisticated, managed service providers (MSPs) face mounting pressure to adapt their cybersecurity offerings. One of the most effective solutions available today is managed extended detection and response (XDR). This approach integrates multiple layers...

/ December 5, 2024