Category: Featured

What exactly is killware, and why is it the next major cyberthreat?

What exactly is killware, and why is it the next major cyberthreat?

Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years, and it’s now a major security issue for organizations....

/ September 5, 2023
Tech Time Warp
Tech Time Warp: Woz dabbles in music festivals

Tech Time Warp: Woz dabbles in music festivals

In this week’s Tech Time Warp we discuss how we all know Steve Wozniak as the co-founder of Apple—but did you know Woz also dabbled in rock festivals? Forty-one years ago, while on hiatus from Apple after a plane crash,...

/ September 1, 2023
Pushing the ‘M’ in MSP

Pushing the ‘M’ in MSP

At times, it is easy to forget what the actuality of being an MSP is. The provision of one or more services as described in the contract is apparent – and this should be conducted in a way that makes...

/ August 31, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls   

Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls   

Today’s Cybersecurity Threat Advisory involves proof-of-concept exploit code that has been publicly released in Juniper SRX firewalls. Using the proof-of-concept exploit code can allow unauthenticated attackers access to remotely execute code in unpatched Juniper JunOS devices. This news comes after...

/ August 30, 2023
Whiffy Recon geolocation
Whiffy Recon highlights geolocation vulnerabilities

Whiffy Recon highlights geolocation vulnerabilities

Geolocation devices are great for keeping tabs on your teenagers or finding the quickest route to the campsite. However, geolocation technology is increasingly a weapon wielded by cybercriminals, and protecting against its use is problematic. Why are geolocation devices a...

/ August 30, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: 3 High-severity CISCO vulnerabilities discovered

Cybersecurity Threat Advisory: 3 High-severity CISCO vulnerabilities discovered

In the latest Cybersecurity Threat Advisory, Cisco has addressed three high-severity vulnerabilities within its NX-OS and FXOS software, which have the potential to trigger denial-of-service (DoS) conditions. These vulnerabilities could be exploited by malicious actors to disrupt the normal functioning...

/ August 29, 2023
AI drives the need for managed cybersecurity resiliency services

AI drives the need for managed cybersecurity resiliency services

It is becoming more apparent that phishing attacks that compromise credentials are linked to the rise of artificial intelligence (AI). These attacks will only increase in volume and sophistication, and more organizations must focus on limiting the scope of damage...

/ August 29, 2023
Two high-profile ransomware gangs targeting application vulnerabilities

Two high-profile ransomware gangs targeting application vulnerabilities

Since the start of the ransomware epidemic, cybercriminals’ preferred method of attack always been phishing. Email security and user behavior were not advanced as they are today, and people being careless about checking before they click led to many ransomware infections. These...

/ August 28, 2023
Tech Time Warp
Tech Time Warp: Why the Panix attack was a wake-up call

Tech Time Warp: Why the Panix attack was a wake-up call

In this week’s Tech Time Warp, we take a look at how a work emergency is never good news—and when notice of it comes late on a Friday afternoon, it’s even worse. Especially when the news is that your internet...

/ August 25, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: XLoader malware targeting macOS

Cybersecurity Threat Advisory: XLoader malware targeting macOS

Today’s Cybersecurity Threat Advisory sheds light on a resurgence of XLoader malware in the wild targeting macOS systems as a disguised “OfficeNote” application. This trojan leverages social engineering tactics to entice users into downloading and executing the malicious app that...

/ August 25, 2023