Category: Featured

Tech Time Warp: Father Christmas leaves a lump of coal for NASA
These days, there seems to be a festive seasonal version of everything. Even items you never dreamed possible (such as cat litter). Malware is no exception. In this edition of Tech Time Warp, we look back at 35 years ago,...

Cybersecurity Threat Advisory: Google OAuth vulnerability
In this Cybersecurity Threat Advisory, we’re looking at a critical Google OAuth vulnerability that allows ex-employees to maintain access to applications such as Slack and Zoom. After off boarding, attackers can achieve access by creating non-Gmail accounts using corporate email...

A look back at the top cybersecurity trends of 2023
December is the time when we pause and reflect on the past year. Keeping with the mantra that the past is a prologue, looking at what occurred may help us understand and prepare for what is coming. This week, we’re...

AI is on track to transform managed services in 2024
Artificial intelligence is all the rage these days, but many managed service providers (MSPs) have been making use of it in some capacity for years. The main difference is with the rise of generative AI. It’s now becoming possible to...

Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX
3CX advised customers that the SQL database integration has been disabled due to CVE-2023-49954. Businesses that use MongoDB or any of their web-based customer relationship management (CRM) integration templates are not affected. Read this Cybersecurity Threat Advisory to gain details...

Cybersecurity Threat Advisory: End-of-Life firewalls actively exploited
Sophos recently addressed a critical vulnerability CVE-2022-3236 involving end-of-life (EOL) firewalls that had been actively exploited. The vulnerability prompted Sophos to release patches for unsupported firewalls after reports of successful attacks on these systems surfaced. Read this Cybersecurity Threat Advisory...

Tech Time Warp: Public sees glimpse of computing’s future on TV
In this edition of Tech Time Warp we see how sixty-nine years ago this week, the public got a televised glimpse of computing innovations we now take for granted. On Dec. 14, 1954, legendary journalist Edward R. Murrow featured the...

Cybersecurity Threat Advisory: New malware campaign from Log4j security flaw
The hacker group, known as Lazarus, is linked to a global campaign. It involves an old security flaw found in Log4j to deploy previously unknown remote access trojans (RATs) on compromised hosts. To learn more and limit the impact of...