Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Cisco vulnerability

Cybersecurity Threat Advisory: Critical Cisco vulnerability

Cisco has disclosed a critical vulnerability, CVE-2024-20419, that affects the Smart Software Manager On-Prem (SSM On-Prem). Successful exploitation of this flaw allows unauthenticated remote threat actors to change administrative passwords. Review the details in this Cybersecurity Threat Advisory to mitigate...

/ July 19, 2024
Tech Time Warp
Tech Time Warp: Fond memories of the Famicom

Tech Time Warp: Fond memories of the Famicom

Whether gamers or not, the NES, or Nintendo Entertainment System console, is ubiquitous with childhood for Americans who grew up in the 1980s and 1990s. But casual observers may not know that before Nintendo brought the NES to the American...

/ July 19, 2024
Mobile device threats: How serious are they?

Mobile device threats: How serious are they?

No matter how well a managed service provider (MSP) secures a client’s network, none of that matters if a hacker can gain access via a mobile device. According to statistics, mobile devices are an increasingly attractive target for hackers. Based...

/ July 18, 2024
Partner Spotlight: MSP strengthens security service offering with Barracuda XDR

Partner Spotlight: MSP strengthens security service offering with Barracuda XDR

Located in Fort Lauderdale, FL, LAN Infotech specializes in Managed IT services, IT consulting, helpdesk services, data backup solutions, business communications, and work-from-home solutions. As an IT Managed Support leader, they strongly believe technology is one of the primary cornerstones...

/ July 18, 2024 / 16 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

The Veeam Backup & Replication vulnerability, CVE-2023-27532, which was patched in March 2023 is still being exploited. Attackers have managed to exploit unpatched systems to launch ransomware attacks since April 2024. Barracuda MSP recommends reviewing this Cybersecurity Threat Advisory in...

/ July 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

A critical vulnerability known as CVE-2024-39929 has been identified in Exim Mail Server, impacting versions 4.87 to 4.95.1. This vulnerability enables attackers to bypass security filters, posing a significant risk to email communications and the security of over 15 million...

/ July 17, 2024
Transparent data
Tip Tuesday: Enhance customer trust with data transparency

Tip Tuesday: Enhance customer trust with data transparency

If you’re like many managed service providers (MSPs), you’ve likely run into data transparency issues — even if you didn’t realize it then. As it turns out, this concept is fundamental to privacy and data security. What should you do...

/ July 16, 2024
Report
Achieving IT-business alignment is a must for organizations

Achieving IT-business alignment is a must for organizations

A report published by NTT Data finds only roughly half (51 percent) of organizations have fully aligned their technology to their business strategy needs. An additional 39 percent report that they partially align. The report is based on an analysis...

/ July 16, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Citrix has identified two critical vulnerabilities in its NetScaler products, including NetScaler Console, NetScaler SVM, and NetScaler Agent. These vulnerabilities can allow unauthorized access to sensitive data and lead to denial of service (DoS) attacks. Read this Cybersecurity Threat Advisory...

/ July 15, 2024
Threat Spotlight: Attackers abuse URL protection services to mask phishing links

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link...

/ July 15, 2024