Category: Featured

Cybersecurity Threat Advisory: RedTail exploits PAN-OS vulnerability
Palo Alto Networks has recently disclosed a critical zero-day vulnerability, CVE-2024-3400, within its PAN-OS operating system. The flaw, found in the GlobalProtect Gateway, is currently under active exploitation. Additionally, the threat actors behind RedTail cryptocurrency mining malware have added this...

Global MSP Day 2024: Discovering opportunities to fuel growth
The seventh annual Global MSP Day is here! Global MSP Day presents an opportunity to celebrate the hard work and resiliency of you, the managed service provider (MSP) community. The industry is constantly changing from the introduction of sophisticated cyberthreats,...

Cybersecurity Threat Advisory: New ShrinkLocker ransomware strains
ShrinkLocker is a recent ransomware strain that leverages a legitimate Windows encryption feature, BitLocker, to lock victims out of their devices. It shrinks the partition, increasing the impact of the attack. Review this Cybersecurity Threat Advisory in detail to prevent...

Cybersecurity Threat Advisory: Oracle WebLogic Server vulnerability
There has been active exploitation of a critical operating system (OS) command injection vulnerability, known as CVE-2017-3506, found in the Oracle WebLogic Server. The impact can be severe, ranging from financial loss to reputational damage. Review this Cybersecurity Threat Advisory...

Cybersecurity Threat Advisory: New attack tactic from DarkGate MaaS operation
The DarkGate Malware-as-a-Service (MaaS) operation are now using AutoHotkey to deliver the last stages of cyber attacks. Read this Cybersecurity Threat Advisory to learn more about this advanced tactic and how to mitigate your risks. What is the threat? DarkGate,...

5 Ways cybercriminals are using AI: Access and credential theft
Threat actors have embraced artificial intelligence (AI) for phishing, deepfakes, malware generation, content localization, and more. This week we’re looking at how they’re using it for credential theft to gain access to high-value networks. Stolen credentials are a goldmine for cybercriminals, especially if the...

Cybersecurity Threat Advisory: Check Point zero-day vulnerability
Check Point has issued a warning regarding a critical zero-day vulnerability known as CVE-2024-24919. The vulnerability has a CVSS score of 7.5 and is being actively exploited by threat actors in the wild. This can potentially allow attackers to read...

How MSPs can stay competitive and relevant in the evolving threat landscape
Managed service providers (MSPs) are far more specialized in 2024 than they were a decade ago. The days of hiring an outside service to fix a firewall or install a patch and then disappear, are gone. Today, MSPs are indispensable...

Tech Time Warp: The staying power of COBOL
In this edition of Tech Time Warp, we see how technology moves quickly. Each new iPhone renders the previous generation obsolete, with the earliest models now firmly in the quaint antique category. That’s why it’s so remarkable that COBOL, a...