Category: Featured

Simplify your security stack with Barracuda Email Protection plans

Simplify your security stack with Barracuda Email Protection plans

Have you heard about the latest Barracuda Email Protection Plans available to MSP partners? These tested and proven plans are designed to help MSPs scale their business while meeting customers’ email security needs. With today’s evolving cyberthreats, it is imperative...

/ April 19, 2024
Tech Time Warp
Tech Time Warp: The breakthrough against software piracy that wasn’t

Tech Time Warp: The breakthrough against software piracy that wasn’t

In this edition of Tech Time Warp we go back to April 14, 1995, when the Chinese government began widespread efforts to stop its government agencies from using pirated software. The move came after a Feb. 27, 1995, accord agreement...

/ April 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...

/ April 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: LayerSlider SQL injection vulnerability

Cybersecurity Threat Advisory: LayerSlider SQL injection vulnerability

An unauthenticated Structured Query Language (SQL) injection vulnerability, known as CVE-2024-2879, has been found in the WordPress plugin LayerSlider. Review this Cybersecurity Threat Advisory to learn how to safeguard your accounts from unauthenticated attackers. What is the threat? The vulnerability...

/ April 16, 2024
Four automation priorities MSPs should focus on

Four automation priorities MSPs should focus on

Many organizations conduct surveys every year about the evolving threats and cybersecurity concerns that enterprises are faced with. Info-Tech Research Group’s report is a must-read for all security stakeholders, chief information security officers (CISOs), and managed service providers (MSPs). Some...

/ April 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in Palo Alto PAN-OS

Cybersecurity Threat Advisory: Critical vulnerability in Palo Alto PAN-OS

Palo Alto Networks has disclosed a critical vulnerability, CVE-2024-3400, impacting its PAN-OS software’s GlobalProtect feature. This flaw enables unauthenticated attackers to execute arbitrary code with root privileges on affected firewalls. Review this Cybersecurity Threat Advisory to keep your organization secure...

/ April 15, 2024
QR code phishing: What MSPs need to know to protect their customers

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ April 12, 2024
Pioneers in Tech: Happy birthday to Chief Yahoo David Filo

Pioneers in Tech: Happy birthday to Chief Yahoo David Filo

You’ve heard of Ben and Jerry, but are you as familiar with Jerry and David? Unless you’re a keen watcher of Silicon Valley, perhaps not. But the website founded in 1994 as “Jerry and David’s Guide to the World Wide...

/ April 12, 2024
Generative AI is a game-changer for how MSPs demonstrate value

Generative AI is a game-changer for how MSPs demonstrate value

Customers like to have a clear understanding of what’s going on. MSPs hold more than enough data to let customers know what is going on with their services. However, they struggle to transform this data into a useful form that...

/ April 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical flaws in Ivanti

Cybersecurity Threat Advisory: Critical flaws in Ivanti

Recent flaws found in Ivanti Connect Secure and Policy Secure Gateways can lead to remote code execution (RCE) attacks. Review this Cybersecurity Threat Advisory to learn additional details and recommendations to keep your organization secure. What is the threat? Ivanti...

/ April 11, 2024