Category: Featured

Tech Time Warp: Shamoon virus makes its first appearance

Tech Time Warp: Shamoon virus makes its first appearance

On Aug. 15, 2012, someone with high levels of network access at Saudi Aramco, one of the world’s largest oil companies, unleashed a virus that wiped data from more than 30,000 computers. The release of Shamoon is considered one of...

/ August 19, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Palo Alto PAN-OS vulnerability

Cybersecurity Threat Advisory: Palo Alto PAN-OS vulnerability

This week, Palo Alto released a patch for PAN-OS’ vulnerability (CVE-2022-0028). This vulnerability is actively being targeted by threat actors. Firewalls running PAN-OS could permit an attacker to perform a Denial-of-Service (DoS) attack. Barracuda MSP recommends updating affected Palo Alto...

/ August 17, 2022
A look at back-to-school cyberthreats

A look at back-to-school cyberthreats

As we discussed last week, back-to-school brings out hackers and cybercriminals. This week we’ll look at some of the specific threats that schools, educators, and even students face this year and what MSPs can to do help protect their education...

/ August 16, 2022 / 6 Comments
Pioneers in Tech: Mina Rees, a mid-century technology trailblazer

Pioneers in Tech: Mina Rees, a mid-century technology trailblazer

Like so many “pioneers in tech,” Mina Rees did not let much dissuade her from her ultimate goals. Born Aug. 2, 1902, in Cleveland, Ohio, Rees grew up in New York City. After graduating summa cum laude from Hunter College...

/ August 12, 2022
Zero Trust, XDR, and digital transformation: Interview with Fleming Shi

Zero Trust, XDR, and digital transformation: Interview with Fleming Shi

For anyone involved in tech and security, it’s hard to avoid a blizzard of messaging and advertising around Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR). But it can be remarkably difficult to understand exactly what a...

/ August 8, 2022
Tech Time Warp: The truth about shatter attacks

Tech Time Warp: The truth about shatter attacks

In this week’s Tech Time Warp, we’re looking back at August 2002, when security researcher Kristin Paget published a whitepaper on the dangers of “shatter attacks,” and Microsoft had more than a few quibbles with it.

/ August 5, 2022
IBM’s Annual Cost of Breach Report shows rising risks

IBM’s Annual Cost of Breach Report shows rising risks

As a self-professed cybersecurity data nerd, I look forward each year to IBM’s annual Cost of Data Breach report. It’s a “fun” read if you like this sort of thing. And just in time for summer beach reading, the report...

/ August 3, 2022
Why MSPs are attractive cyberattack targets

Why MSPs are attractive cyberattack targets

Once again, government watchdogs have issued an alert to managed service providers (MSPs), encouraging them to implement new security guidance in response to increasing levels of cyberattacks. MSPs are a prime target for cybercriminals – they have direct access to...

/ August 2, 2022
AWS adds raft of security competencies for MSP partners

AWS adds raft of security competencies for MSP partners

Amazon Web Services (AWS) has raised the cloud security bar for managed service providers (MSPs). At the AWS re:Inforce conference, the leading provider of cloud services added six AWS Level 1 MSSP Competency Specialization Categories spanning identity behavior monitoring; data...

/ August 1, 2022
Tech Time Warp: Koobface Worms Its Way Through Facebook

Tech Time Warp: Koobface Worms Its Way Through Facebook

For this week’s Tech Time Warp, we’re going back to August 2008—when you were still juggling Facebook and MySpace profiles—unsuspecting social networkers found their machines infected by Koobface, a particularly nasty computer worm. Koobface (an anagram for Facebook) caught its victims...

/ July 29, 2022