Category: Featured
Pioneers in Tech: An Wang, a key player in technology’s core memories
The layperson might not immediately name An Wang as a 20th-century technical giant, but we certainly should. The Chinese American computer engineer invented the magnetic pulse transfer controlling device, which, as you will learn in this edition of Pioneers in...
Cybersecurity Threat Advisory: RCE vulnerabilities in HPE Aruba Networking devices
HPE Aruba Networking has disclosed that critical remote code execution (RCE) vulnerabilities are impacting multiple versions of ArubaOS. Out of the ten vulnerabilities found, four pose critical risks of unauthenticated buffer overflows in various services. Read this Cybersecurity Threat Advisory...
Tech Time Warp: Voyager’s nearly 47 years of technology brilliance
In this edition of Tech Time Warp, we take a look at how, for almost 47 years, NASA’s Voyager 1 spacecraft has transmitted the amazing secrets of the universe back to Earth. Along with that, the news that engineers had...
Your MSP website doesn’t need to be catchy
IT is one of the most in-demand business services in the world. There are thousands and thousands of managed service providers (MSPs) out there. The struggle in every crowded industry is to stand out. The IT world is no exception....
Cybersecurity Threat Advisory: R programming vulnerability
A critical security flaw known as CVE-2024-27322 with a CVSS score of 8.8, has been discovered within the R programming language. Attackers can craft malicious RDS files or R packages that embed arbitrary R code. Barracuda MSP recommends reading this...
Reducing our reliance on passwords to boost security
Data breaches remain a serious threat to every business. In 2023, about half of them reported experiencing a data breach, according to the Data Breaches Investigations Report. In the United States, more than 90 million accounts were breached in the third...
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year
Remote desktop software allows employees to connect into their computer network without being physically linked to the host device or even in the same location. This makes it a useful tool for a distributed or remote workforce. Unfortunately, remote desktop...
Cybersecurity Threat Advisory: Credential stuffing attacks targeting Okta
Okta has observed an unprecedented spike in credential stuffing attacks targeting its identity and access management solutions. Attackers are leveraging the TOR anonymization network and residential proxies to compromise user accounts. To mitigate this risk, Barracuda MSP recommends reading this...
