Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability in Ivanti secure access solutions

Cybersecurity Threat Advisory: Vulnerability in Ivanti secure access solutions

A critical security flaw in Ivanti, CVE-2025-0283, is affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This stack-based buffer overflow vulnerability allows a locally authenticated attacker to escalate their privileges. Continue reading this Cybersecurity Threat Advisory to mitigate your...

/ January 17, 2025
Automated incident response – efficiency at scale

Automated incident response – efficiency at scale

No matter how robust your email security measures are, some threats will inevitably bypass initial defenses. Whether it’s a sophisticated phishing attack or an emerging malware variant, the ability to swiftly detect and respond to post-delivery threats is critical for...

/ January 16, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Fortinet zero-day vulnerability

Cybersecurity Threat Advisory: Fortinet zero-day vulnerability

A critical zero-day vulnerability has been found affecting Fortinet FortiOS and FortiProxy devices. This vulnerability enables attackers to bypass authentication and gain privileges. Keep reading this Cybersecurity Threat Advisory for information to keep your environment safe. What is the threat?...

/ January 15, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

A critical security vulnerability in the Aviatrix Controller cloud networking platform has been discovered and is actively exploited by threat actors to deploy backdoors and cryptocurrency miners. Multiple cloud deployments have reported that they have been compromised following this disclosure....

/ January 15, 2025
2024
2024 by the numbers

2024 by the numbers

The threat landscape is always churning, with new threats emerging while others disappear or fade to irrelevance. Consider ALPHV, a ransomware-as-a-service (RaaS) group that provided the infrastructure, tools, and administrative services to the individual hacker who ransomed $22 million from Change Healthcare...

/ January 14, 2025
insider threats
Insider threats expected to persist in 2025

Insider threats expected to persist in 2025

SmarterMSP.com recently covered the topic of insider threats, but many experts continue to point to these types of threats as one of the biggest cybersecurity challenges impacting organizations in 2025. The Hacker News, for instance, says: Insider threats are expected...

/ January 14, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Ivanti’s Connect Secure VPN

Cybersecurity Threat Advisory: Active exploitation of Ivanti’s Connect Secure VPN

A critical Ivanti Connect Secure VPN vulnerability, identified as CVE-2025-0282, was disclosed. Threat actors are actively exploiting it in the wild, primarily targeting organizations relying on Ivanti’s Zero Trust Access (ZTA) solutions. Review this Cybersecurity Threat Advisory to see how...

/ January 13, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerabilities in SonicWall

Cybersecurity Threat Advisory: Critical vulnerabilities in SonicWall

SonicWall disclosed three critical vulnerabilities affecting the SonicOS firmware. These flaws include an authentication bypass affecting the SSL VPN and SSH management interfaces, which can enable attackers unauthorized access upon successful exploitation. Continue reading this Cybersecurity Threat Advisory for more...

/ January 10, 2025
email security
AI-powered email security: How AI enhances integrated cloud email security

AI-powered email security: How AI enhances integrated cloud email security

Barracuda recently launched new email protection plans that enable customers to fully defend their email environments with security tailored to their specific needs. Our first post in this series defined and explained the components necessary to defend against modern threats. In this post,...

/ January 8, 2025
Cybersecurity 2025
Experts look ahead part 2: Cybersecurity in 2025

Experts look ahead part 2: Cybersecurity in 2025

Last week, we consulted several cybersecurity experts to gain insights into potential threats that may emerge in 2025. Given the variety of opinions and expertise available, we decided to reach out again this week and compiled an equally diverse and...

/ January 7, 2025