Category: Security

SMBs must prioritize cybersecurity planning
Cybersecurity vulnerabilities connected to large businesses have received much attention recently, especially the several casinos in Las Vegas that were forced to go offline due to cyberattacks. Casinos are a vital economic engine in Nevada, but it’s not just sprawling...

Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities
Apple has released more security patches after three zero-day vulnerabilities were discovered in iOS, iPadOS, MacOS, WatchOS, and Safari. These vulnerabilities are actively being exploited in the wild against several frameworks and systems of Apple products, making sixteen total zero-days...

Current IT monitoring approaches lead to MSP opportunity
As environments become more complex, the level of satisfaction with existing approaches to IT monitoring is declining. A survey of 500 IT leaders conducted by Method Research on behalf of LogicMonitor finds nearly half of respondents (46 percent) have negative...

Cybersecurity Threat Advisory: Threat actor targets government
This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing...

Cybersecurity Threat Advisory: Critical security patches for GitLab
This Cybersecurity Threat Advisory highlights GitLab’s recent critical vulnerability, which security update have been released for. A successful exploitation can allow threat actors to mask themselves as other users during scheduled security scans while they run automated tasks (also known...

Webinar: “Uplevel Your MSP Business” with Barracuda MSP
The turbulent cyberthreat landscape has many MSPs rethinking their strategies when it comes to cybersecurity. And in turn, this affects how they uplevel their MSP businesses. So, what can you do? Well, smart MSPs, such as MJ Flood, look for...

Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered
Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to...

Threat Spotlight: How attackers use inbox rules to evade detection after compromise
Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

Cybersecurity Threat Advisory: BlackCat ransomware targets Microsoft Azure
This Cybersecurity Threat Advisory reviews the latest movements of the BlackCat ransomware gang. They are using the Sphynx encryptor to target Microsoft Azure storage through a recently discovered vulnerability in Azure’s security infrastructure. The BlackCat (ALPHV) ransomware gang is using...

Cybersecurity Threat Advisory: Critical Acrobat and Reader zero-day vulnerability
This Cybersecurity Threat Advisory shares information on the new Adobe zero-day vulnerability detected in Acrobat and Reader. Adobe has taken proactive measures by issuing security updates to this zero-day vulnerability, which has been exploited in attacks. While comprehensive details about...