Category: Featured

Beyond the horizon: Growth of cyberattacks in the 2010s

Beyond the horizon: Growth of cyberattacks in the 2010s

As part of our 5-part series on the evolution of cybersecurity, check out our fourth article below that covers IoT devices and vulnerabilities to Bitcoin-driven ransomware in the 2010s. During the 2000s, we saw the growing arms race between security...

/ January 2, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: A look back at 2023

Cybersecurity Threat Advisory: A look back at 2023

2023 was an eventful year for our Cybersecurity Threat Advisory series. We highlighted several vulnerabilities exploited in the wild, multiple ransomware groups striking against notable establishments (including targeting MSPs), and an increase in cyber hacktivism due to world events. Below...

/ January 1, 2024
Tech Time Warp: Everybody was kung fu fighting

Tech Time Warp: Everybody was kung fu fighting

This week’s Tech Time Warp goes back twenty-nine years ago, when one of the more convoluted chapters in technology history was being written. Research scientist Tsutomu Shimomura was enjoying a Christmas vacation in Lake Tahoe when he received a troubling...

/ December 29, 2023
Five powerful security tips for keeping data secure this Christmas

Five powerful security tips for keeping data secure this Christmas

Keeping your data safe over Christmas is as important as ever. We’ll assume you’ve already done this for your business, but what about your household? That’s why we’ve pulled together a selection of seasonal security tips for you to keep...

/ December 25, 2023
Tech Time Warp
Tech Time Warp: Father Christmas leaves a lump of coal for NASA

Tech Time Warp: Father Christmas leaves a lump of coal for NASA

These days, there seems to be a festive seasonal version of everything. Even items you never dreamed possible (such as cat litter). Malware is no exception. In this edition of Tech Time Warp, we look back at 35 years ago,...

/ December 22, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Google OAuth vulnerability

Cybersecurity Threat Advisory: Google OAuth vulnerability

In this Cybersecurity Threat Advisory, we’re looking at a critical Google OAuth vulnerability that allows ex-employees to maintain access to applications such as Slack and Zoom. After off boarding, attackers can achieve access by creating non-Gmail accounts using corporate email...

/ December 22, 2023
A look back at the top cybersecurity trends of 2023

A look back at the top cybersecurity trends of 2023

December is the time when we pause and reflect on the past year. Keeping with the mantra that the past is a prologue, looking at what occurred may help us understand and prepare for what is coming. This week, we’re...

/ December 21, 2023
AI is on track to transform managed services in 2024

AI is on track to transform managed services in 2024

Artificial intelligence is all the rage these days, but many managed service providers (MSPs) have been making use of it in some capacity for years. The main difference is with the rise of generative AI. It’s now becoming possible to...

/ December 20, 2023
Tubbservatory
Tubbservatory round-up: Tools and resources for your MSP

Tubbservatory round-up: Tools and resources for your MSP

Every week, Richard‘s keeping a keen eye out, bringing you five essential resources that every IT Managed Service Provider (MSP) should have on their radar. Welcome to the Tubbservatory – your weekly treat, chock-full of handpicked articles, podcasts, and events that...

/ December 20, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX

Cybersecurity Threat Advisory: SQL injection vulnerability with 3CX

3CX advised customers that the SQL database integration has been disabled due to CVE-2023-49954. Businesses that use MongoDB or any of their web-based customer relationship management (CRM) integration templates are not affected. Read this Cybersecurity Threat Advisory to gain details...

/ December 19, 2023