Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

The Veeam Backup & Replication vulnerability, CVE-2023-27532, which was patched in March 2023 is still being exploited. Attackers have managed to exploit unpatched systems to launch ransomware attacks since April 2024. Barracuda MSP recommends reviewing this Cybersecurity Threat Advisory in...

/ July 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

Cybersecurity Threat Advisory: Critical Exim Mail Server vulnerability

A critical vulnerability known as CVE-2024-39929 has been identified in Exim Mail Server, impacting versions 4.87 to 4.95.1. This vulnerability enables attackers to bypass security filters, posing a significant risk to email communications and the security of over 15 million...

/ July 17, 2024
Transparent data
Tip Tuesday: Enhance customer trust with data transparency

Tip Tuesday: Enhance customer trust with data transparency

If you’re like many managed service providers (MSPs), you’ve likely run into data transparency issues — even if you didn’t realize it then. As it turns out, this concept is fundamental to privacy and data security. What should you do...

/ July 16, 2024
Report
Achieving IT-business alignment is a must for organizations

Achieving IT-business alignment is a must for organizations

A report published by NTT Data finds only roughly half (51 percent) of organizations have fully aligned their technology to their business strategy needs. An additional 39 percent report that they partially align. The report is based on an analysis...

/ July 16, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Citrix has identified two critical vulnerabilities in its NetScaler products, including NetScaler Console, NetScaler SVM, and NetScaler Agent. These vulnerabilities can allow unauthorized access to sensitive data and lead to denial of service (DoS) attacks. Read this Cybersecurity Threat Advisory...

/ July 15, 2024
Threat Spotlight: Attackers abuse URL protection services to mask phishing links

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link...

/ July 15, 2024
Pioneers in Tech
Pioneers in Tech: Nikola Tesla’s vision for wireless communication

Pioneers in Tech: Nikola Tesla’s vision for wireless communication

This edition of Pioneers in Tech looks at the legend of Nikola Tesla—not only do electric cars bear his name, but also his alternating-current (AC) electric system remains the basis of electricity today. Plus, the “Tesla coil” he invented is...

/ July 12, 2024
PHI Hackers
Tips for MSPs to protect PHI from hackers

Tips for MSPs to protect PHI from hackers

Hackers love personal healthcare information (PHI). Health records contain a trove of highly saleable information that can fetch high prices on the dark web. Enlance Health found that in the past two years alone, over 800 security breaches targeting healthcare...

/ July 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Four vulnerabilities were found in Gogs Git Service, impacting multiple versions up to 0.13.0. The vulnerabilities can impact the confidentiality and availability of data, however, code execution is possible. Continue reading this Cybersecurity Threat Advisory to protect your accounts and...

/ July 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

A new ransomware-as-a-service (RaaS), known as Eldorado, recently emerged, introducing locker variants for both VMware ESXi and Windows systems. Eldorado has rapidly demonstrated its ability to inflict severe damage on victims’ data, reputation, and business continuity. Review this Cybersecurity Threat...

/ July 10, 2024