Category: Featured

Cybersecurity Threat Advisory: Critical NetApp SnapCenter vulnerability
NetApp SnapCenter disclosed a critical security vulnerability, identified as CVE-2025-26512. This flaw enables authenticated users to escalate their privileges and gain unauthorized administrative access upon successful exploitation. Continue reading this Cybersecurity Threat Advisory to learn more about this vulnerability and...

Survey: MSPs taking on larger cloud role
A global survey of over 750 technical professionals and executive leaders finds that 60 percent are using managed service providers (MSPs) to handle some (29 percent) or more of their public cloud management, and 18 percent report they expect to...

A game plan for MSPs to overcome AI objections
Artificial intelligence (AI) is following a standard hype curve. AI started as something that few people really knew about. However, it exploded into public consciousness as large companies like Microsoft, AWS, and Google embedded AI services into their cloud offerings....

Cybersecurity Threat Advisory: Critical Ingress vulnerabilities
Researchers identified several critical vulnerabilities in the Ingress NGINX Controller for Kubernetes, including CVE-2025-24513, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, and CVE-2025-1974. These flaws enables threat actors to execute unauthenticated remote code. Review the details of this Cybersecurity Threat Advisory to keep your...

Cybersecurity Threat Advisory: RCE vulnerability in Veeam Backup & Replication
A vulnerability, tracked as CVE-2025-23120, with a CVSS score of 9.9, has been discovered in Veeam Backup & Replication. This vulnerability can allow attackers to exploit the system and execute remote code on the Veeam Backup Server. Continue reading this...

Cybersecurity Threat Advisory: BYOVD attacks leveraged by Medusa ransomware
The Medusa ransomware-as-a-service (RaaS) operation has recently been observed using a malicious driver named ABYSSWORKER in Bring Your Own Vulnerable Driver (BYOVD) attacks. This technique allows threat actors to disable security software by exploiting legitimate, vulnerable drivers to gain kernel-level...

Tech Time Warp: The 10-day takeover of a botnet
In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...