Category: Featured

Tech Time Warp
Tech Time Warp: The curious history of QWERTY

Tech Time Warp: The curious history of QWERTY

From time to time, your inner Mavis Beacon might wonder about the seemingly nonsensical arrangement of your keyboard. What’s the story behind QWERTY? You’ll find out in this edition of Tech Time Warp! On June 23, 1868, Christopher Latham Sholes,...

/ June 28, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: MOVEit Transfer vulnerability exploit

Cybersecurity Threat Advisory: MOVEit Transfer vulnerability exploit

Progress Software has released a patch for a high-severity vulnerability in MOVEit Transfer, identified as CVE-2024-5806. This vulnerability is currently under active attack and allows attackers to bypass authentication mechanisms. Organizations using MOVEit Transfer should review this Cybersecurity Threat Advisory...

/ June 28, 2024
AI
Can AI help MSPs improve margins?

Can AI help MSPs improve margins?

Artificial intelligence (AI) is being touted as a magic elixir – whatever the problem is, AI is the answer. Unfortunately, it is not quite ready to do many of the more advanced things that people want to do. However, in...

/ June 27, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Five new vulnerabilities found in Zyxel NAS

Cybersecurity Threat Advisory: Five new vulnerabilities found in Zyxel NAS

Zyxel has released a patch for their NAS326 and NAS542 to fix five new vulnerabilities that have been discovered. These vulnerabilities affect devices with versions 5.21 (AAZF16/ABAG13) and earlier. Barracuda MSP recommends customers using these devices to follow the steps...

/ June 27, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Microsoft vulnerabilities

Cybersecurity Threat Advisory: Active exploitation of Microsoft vulnerabilities

This Cybersecurity Threat Advisory highlights a new attack technique exploiting vulnerabilities in Microsoft Management Console (MMC). By creating malicious management saved console (MSC) files that appear legitimate, attackers can bypass traditional security measures and exploit the targeted MMC. Barracuda MSP...

/ June 26, 2024
Tech Time Warp: Far past time to move to AES encryption

Tech Time Warp: Far past time to move to AES encryption

In May 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and Federal Partnership for Interoperable Communications (FPIC) released a whitepaper warning government agencies about the dangers of relying on the Data Encryption Standard (DES)—a nearly 50-year-old technology—for cybersecurity. Let’s get...

/ June 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware privilege escalation vulnerabilities

Cybersecurity Threat Advisory: VMware privilege escalation vulnerabilities

VMware has released patches to address critical vulnerabilities impacting Cloud Foundation, vCenter Server, and vSphere ESXi, which could be exploited to achieve privilege escalation and remote code execution. The flaws, identified as CVE-2024-37079, CVE-2024-37080, and CVE-2024-37081, have high CVSS scores....

/ June 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical ASUS vulnerability

Cybersecurity Threat Advisory: Critical ASUS vulnerability

ASUS released a product security advisory urging customers to update their firmware to address a critical authentication bypass vulnerability impacting multiple of its router models. Review this Cybersecurity Threat Advisory to learn which router models are impacted and how to...

/ June 21, 2024
Deepfake technology
Deepfake technology: Why it’s a risk to your business

Deepfake technology: Why it’s a risk to your business

Deepfake technology, sometimes colloquially named ‘deepfakes’, has been getting a lot of attention in the mainstream news media in recent years. But now, it’s no longer just a harmless entertainment medium, it poses a significant threat to your business if...

/ June 20, 2024
Blockchain: The cybersecurity tool MSPs should keep an eye on

Blockchain: The cybersecurity tool MSPs should keep an eye on

With cyber threats coming from all directions, managed service providers (MSPs) need as many mitigation measures as possible. One often overlooked area is the emergence of blockchain technology as a cybersecurity tool. Several software solutions incorporate blockchain and have become...

/ June 20, 2024