Category: Security
Cybersecurity Threat Advisory: Cisco Catalyst SD-WAN zero day vulnerability
An authentication bypass zero-day vulnerability, tracked as CVE-2026-20182 with a maximum CVSS score of 10.0, has been identified in Cisco Catalyst SD-WAN Controller and Manager. The vulnerability allows unauthenticated attackers to gain the highest level of administrative access to affected...
Patch management: The basics still matter
Patching is such a core part of MSP DNA that it’s easy to overlook. I’ve talked with many MSP owners who get pulled into the latest, most urgent cyberthreats—only to lose sight of the basics: patching. Patching is the cybersecurity...
Cybersecurity Threat Advisory: RedSun exploits Microsoft Defender real-time protection
A new proof of concept (PoC), RedSun, exploits Windows devices running Microsoft Defender real‑time protection on Windows 10, Windows 11, and Windows Server 2019+. It abuses Defender’s handling of cloud‑tagged files to achieve local privilege escalation to SYSTEM. Read this...
Cybersecurity Threat Advisory: BitUnlocker attack
A newly published proof of concept (PoC) tool called BitUnlocker demonstrates a dangerous downgrade attack that can bypass Microsoft’s BitLocker full‑disk encryption on Windows 11 devices. Continue reading this Cybersecurity Threat Advisory to minimize your risk. What is the threat? BitUnlocker...
Cybersecurity Threat Advisory: GhostLock – A new denial-of-availability attack technique
GhostLock is a newly disclosed attack technique that abuses the Windows CreateFileW API to lock enterprise files by requesting exclusive, deny‑share handles. Read this Cybersecurity Threat Advisory to learn how to limit your organization’s exposure to this attack. What is...
Cybersecurity Threat Advisory: RMM-based phishing attacks
An ongoing phishing campaign has been observed targeting multiple vectors and leveraging legitimate Remote Monitoring and Management (RMM) tools to establish persistent remote access on compromised hosts. Read this Cybersecurity Threat Advisory to mitigate risk for you and your clients....
Cybersecurity Threat Advisory: Linux kernel vulnerabilities exploited by Dirty Frag
Dirty Frag is a newly disclosed Linux kernel local privilege escalation (LPE) exploit chain. It combines two independent kernel vulnerabilities—CVE‑2026‑43284 and CVE‑2026‑43500—to deliver reliable, first‑attempt root access across virtually all major Linux distributions. A working proof of concept (PoC) is...
Cybersecurity Threat Advisory: PAN-OS Captive Portal zero-day vulnerability
Threat actors are actively exploiting a PAN‑OS zero‑day that impacts the User‑ID Authentication (Captive) Portal. This exploit enables unauthenticated remote code execution with root privileges on PA‑Series and VM‑Series firewalls. Continue reading this Cybersecurity Threat Advisory to learn how to...
Cybersecurity Threat Advisory: MOVEit authentication bypass vulnerability
A vulnerability has been identified involving a critical authentication bypass in Progress MOVEit Automation, a widely used managed file transfer and automation platform. This flaw allows unauthenticated attackers to bypass authentication mechanisms and gain unauthorized access to MOVEit Automation environments....
The compliance trap: checking boxes isn’t the same as being secure
When businesses pass a SOC 2 audit, complete a HIPAA assessment, or earn a Cyber Essentials certification, there’s often a sense of relief—the work is done. In reality, that moment is where risk often begins. “Compliance frameworks establish a baseline,”...

