Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Telecoms targeted with new malware

Cybersecurity Threat Advisory: Telecoms targeted with new malware

A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory. What is the...

/ March 26, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical NetScaler ADC and Gateway vulnerability

Cybersecurity Threat Advisory: Critical NetScaler ADC and Gateway vulnerability

Citrix has released security updates to address a critical information disclosure vulnerability affecting NetScaler ADC and NetScaler Gateway. The flaw allows unauthenticated remote attackers to retrieve sensitive information from vulnerable appliances via the HTTP/HTTPS interface. Read this Cybersecurity Threat Advisory...

/ March 26, 2026
How MSPs can keep the peace during conflict

How MSPs can keep the peace during conflict

When international conflicts arise — and the world has seen no shortage in recent years — organizations of all sizes need to stay especially alert. In many cases, managed service providers (MSPs) serve as the first line of defense, helping...

/ March 25, 2026
Advancing cyber resilience at scale with BarracudaONE and a modernized partner program

Advancing cyber resilience at scale with BarracudaONE and a modernized partner program

Cyber resilience today means more than stopping attacks — it’s about keeping systems running, recovering fast, safeguarding data, and reducing risk across expanding environments. As organizations adopt more cloud apps, edge devices, mobile endpoints, and unmanaged AI tools, gaps and...

/ March 24, 2026 / 4 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day

Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day

Recent reporting from Amazon Threat Intelligence and multiple security researchers confirms that the Interlock ransomware group is actively exploiting a critical remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) Software. Read this Cybersecurity Threat Advisory to protect...

/ March 24, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

A critical remote code execution (RCE) vulnerability in Microsoft SharePoint caused by the deserialization of untrusted data has been discovered. Authentication is not required by attackers on unprotected systems. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 23, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Cybersecurity Threat Advisory: FortiCloud SSO exploitation

Threat actors are actively exploiting CVE‑2026‑24858 to log into FortiOS and other Fortinet products via FortiCloud SSO (when enabled), create persistent local admin accounts, and steal device configuration files. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 18, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...

/ March 18, 2026
The quiet comeback of credential-based attacks

The quiet comeback of credential-based attacks

Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...

/ March 17, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...

/ March 16, 2026