Category: Security

The rise of AI PCs: A new endpoint MSPs will soon encounter

The rise of AI PCs: A new endpoint MSPs will soon encounter

Managed service providers (MSPs) in the age of artificial intelligence (AI) will soon see a different type of endpoint, known as AI PCs, on the networks they manage. AI PCs simplify the process of building AI models and running inference...

/ March 6, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical VMware vulnerabilities exploited

Cybersecurity Threat Advisory: Critical VMware vulnerabilities exploited

Three critical vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) are actively exploited, posing a significant threat to VMware virtualization environments. Review the details in this Cybersecurity Threat Advisory to learn how to mitigate your risks. What is the threat? These vulnerabilities present...

/ March 5, 2025
cybercrime economy
“Script Kiddies” get hacked—what it means about the cybercrime economy

“Script Kiddies” get hacked—what it means about the cybercrime economy

The discovery of a Trojan disguised as software to help low-skill hackers build XWorm RAT malware indicates the maturity and complexity of the thriving cybercrime economy—and it reminds us that there’s no honor among thieves. Imagine that you are an ambitious...

/ March 5, 2025
AI risks
AI’s Double-Edged Sword: Harnessing power while mitigating risks

AI’s Double-Edged Sword: Harnessing power while mitigating risks

Artificial intelligence (AI) is everywhere. Companies of all sizes and in every market, including MSSPs, are deploying or experimenting with how the technology can improve everything from call center operations to threat intelligence to marketing to quality control on the...

/ March 3, 2025 / 5 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in PostgreSQL

Cybersecurity Threat Advisory: Critical vulnerability in PostgreSQL

Security experts identified a critical PostgreSQL vulnerability, CVE-2025-1094, with a CVSS of 8.1. The vulnerability poses a significant risk to database integrity in enterprise and production environments. Review this Cybersecurity Threat Advisory to learn how to mitigate your risks. What...

/ February 28, 2025
MSPs
An MSP opportunity: Navigating growing connectivity in healthcare

An MSP opportunity: Navigating growing connectivity in healthcare

The healthcare vertical appeals to managed service providers (MSPs) as connectivity within this already connected industry continues to grow. According to Precedence Research, the global IoT medical devices market was valued at $106 billion USD in 2025 and is projected to...

/ February 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919.  Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ February 25, 2025
XDR cybersecurity
XDR: Your cybersecurity wingman

XDR: Your cybersecurity wingman

As cybercrime continues to rise, the need for automation in cybersecurity has become clear. IT security experts often lack the expertise, headcount, and time to manage the increasing number of alerts and potential threats effectively. For managed service providers (MSPs)...

/ February 24, 2025 / 6 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New OpenSHH vulnerabilities

Cybersecurity Threat Advisory: New OpenSHH vulnerabilities

Two OpenSSH vulnerabilities, CVE-2025-26465 and CVE-2025-26466, affect multiple versions of OpenSSH. These vulnerabilities can be exploited for man-in-the-middle (MitM) attacks or cause a denial-of-service (DoS) attack. Review this Cybersecurity Threat Advisory to mitigate your risk. What is the threat? OpenSSH...

/ February 20, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Xerox printer vulnerabilities

Cybersecurity Threat Advisory: Xerox printer vulnerabilities

Two vulnerabilities, CVE-2024-12510 and CVE-2024-12511, have been found in the Xerox VersaLink C7025 Multifunction Printer. Upon successful exploitation, bad actors can capture authentication credentials through pass-back attacks via lightweight directory access protocol (LDAP), server message block (SMB), and file transfer...

/ February 19, 2025