Category: Featured

Cybersecurity Threat Advisory: Apple Safari arbitrary code execution vulnerability
Apple has had an existing arbitrary code execution vulnerability in their MacOS, iOS, iPadOS, and Safari in their past 3 zero-days known as CVE-2022-22620. Google and Barracuda MSP researchers are making sure users don’t forget this. The vulnerability could allow...

Cybersecurity Threat Advisory: FastJson versions vulnerable to deserialization
A new version of FastJson has been released and has patched a vulnerability which allows malicious actors to utilize “AutoTypeCheck” mechanism and achieve remote code execution in FastJson. All Java applications that pass user-controlled data to either the JSON.parse or...

Tech Time Warp: Did you forget about the first iPhone?
As ubiquitous as the iPhone is today (and as many competitors as it has inspired), it can be difficult to think back to June 2007, when the first iPhone went on sale. Disrupting the Blackberry world, the iPhone of 2007 was...

Cybersecurity Threat Advisory: Black Basta Ransomware Group threat
The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information,...

Cybersecurity Threat Advisory: A Microsoft Azure Synapse vulnerability uncovered
Security researchers at Orca uncovered a vulnerability in Microsoft Azure Synapse, dubbed SynLapse. This vulnerability lies in the ODBC or Online Database Connectivity method employed by Synapse. Once a bad actor gains access through this vulnerability, they can gain access...

Breaking it down: The Evolving Landscape of the MSP Business Report 2022
The fifth annual Evolving Landscape of the MSP Business Report demonstrated to us all that there is still a huge appetite for managed services, with global services-related MSP revenue set to increase by a further ten percent in 2022 compared...

Cybersecurity Threat Advisory: Microsoft 365 functionality vulnerability
Security researchers recently found an existing file version control functionality in Microsoft 365 and Office 365 enables threat actors to encrypt files stored with ransomware. The process used to encrypt these files can make them unrecoverable when proper backup is not...

Tech Time Warp: The Early Days of IBM
The monolith we know today as IBM got its start June 16, 1911, when the forward-thinking Charles R. Flint merged the International Time Recording Company, Computing Scale Company and the Tabulating Machine Company—all “computing and tabulating enterprises”—into the Computing-Tabulating-Recording Company,...

Making sure your vendors are secure
We’ve all heard about major breaches and the cascading impact they can have across a variety of services. As an MSP, these upstream breaches are clearly out of your control, but you can and should be questioning whether the services...

Pioneers in Tech: Lynn Conway’s story
For this week’s Pioneers in Tech, Lynn Conway is in the spotlight. Lynn, a 2014 Computer History Museum fellow, belongs on any list of technology pioneers for her work alone. Working at Xerox PARC, she invented scalable design rules for VLSI...