Category: Security

Cybersecurity Threat Advisory: Exchange Vulnerabilities Being Exploited by Botnet
Threat Update The botnet “Prometei”, discovered in 2020, has been targeting Exchange servers across the United States using the vulnerabilities recently targeted by HAFNIUM. Technical Detail & Additional Information WHAT IS THE THREAT? The Prometei botnet, previously used for mining...

Cybersecurity Threat Advisory: Trend Micro Security Vulnerability Exploited
Threat Update On April 21st, US-Japanese cybersecurity company Trend Micro disclosed that a threat actor are exploiting a known vulnerability in several of its antivirus products (Apex One, Apex One as a Service, OfficeScan XG SP1, Worry-Free Business Security, and...

Cybersecurity Threat Advisory: Over 1 Million Windows RDP Credentials Leaked
Threat Update Hacker group UAS has had 1.3 million RDP credentials for Windows servers leaked by security researchers. The compromised credentials could possibly allow a malicious actor to log into a compromised RDP server. It is imperative to keep best...

Cybersecurity Threat Advisory: SonicWall Zero-Day Vulnerabilities
Threat Update SonicWall, a security hardware manufacturer, has released patches to address a set of three zero-day vulnerabilities. These vulnerabilities affect both on-premises and hosted Email Security products. These vulnerabilities could allow for attackers to create administrative accounts, upload arbitrary...

MSPs must be wary of insider threats
Insider threats comprise some of the most challenging cybersecurity terrain for businesses. Insider threats generally fall into one of two “buckets.” There’s the well-meaning but negligent employee who leaves an unsecured laptop on the train, opens a WiFi hotspot in the...

Cybersecurity Threat Advisory 0021-21: 4/13/21 Microsoft Exchange Patches 2.0
Threat Update Due to the rise in targeted attacks on on-prem Microsoft Exchange servers, Microsoft, security vendors, and threat actors across the world have been looking for vulnerabilities within Microsoft Exchange services. This past Tuesday (4/13/2021), Microsoft has issued another...

Making sure your vendors are secure
We’ve all heard about major breaches and the cascading impact they can have across a variety of services. As an MSP, these upstream breaches are clearly out of your control, but you can and should be questioning whether the services...

Q&A: Ethical hacking and pen testing to protect against phishing
Phishing continues to be one of the biggest threats to network security, which has led to “ethical hacking” being used to protect against it. If you’re wondering why methods like ethical hacking and pen testing are necessary to stop phishing,...

Cybersecurity Threat Advisory: Critical VMware Carbon Black Cloud Vulnerability
Threat Update A critical vulnerability was recently discovered in the VMWare Carbon Black Workload appliance that could allow an attacker to take control of a vulnerable system. A successful exploit would give an attacker the ability to obtain a valid...

Cybersecurity Threat Advisory: ATPs Exploiting FortiOS Vulnerabilities
Threat Update The FBI and CISA released a joint cybersecurity advisory documenting that a number of APTs have been seen in the wild scanning for three FortiOS vulnerabilities (CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812). These vulnerabilities, if exploited, can allow unauthorized remote...