Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exchange Vulnerabilities Being Exploited by Botnet

Cybersecurity Threat Advisory: Exchange Vulnerabilities Being Exploited by Botnet

Threat Update The botnet “Prometei”, discovered in 2020, has been targeting Exchange servers across the United States using the vulnerabilities recently targeted by HAFNIUM. Technical Detail & Additional Information WHAT IS THE THREAT? The Prometei botnet, previously used for mining...

/ April 27, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Trend Micro Security Vulnerability Exploited

Cybersecurity Threat Advisory: Trend Micro Security Vulnerability Exploited

Threat Update On April 21st, US-Japanese cybersecurity company Trend Micro disclosed that a threat actor are exploiting a known vulnerability in several of its antivirus products (Apex One, Apex One as a Service, OfficeScan XG SP1, Worry-Free Business Security, and...

/ April 26, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Over 1 Million Windows RDP Credentials Leaked

Cybersecurity Threat Advisory: Over 1 Million Windows RDP Credentials Leaked

Threat Update Hacker group UAS has had 1.3 million RDP credentials for Windows servers leaked by security researchers. The compromised credentials could possibly allow a malicious actor to log into a compromised RDP server. It is imperative to keep best...

/ April 26, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SonicWall Zero-Day Vulnerabilities

Cybersecurity Threat Advisory: SonicWall Zero-Day Vulnerabilities

Threat Update SonicWall, a security hardware manufacturer, has released patches to address a set of three zero-day vulnerabilities. These vulnerabilities affect both on-premises and hosted Email Security products. These vulnerabilities could allow for attackers to create administrative accounts, upload arbitrary...

/ April 23, 2021
MSPs must be wary of insider threats

MSPs must be wary of insider threats

Insider threats comprise some of the most challenging cybersecurity terrain for businesses. Insider threats generally fall into one of two “buckets.” There’s the well-meaning but negligent employee who leaves an unsecured laptop on the train, opens a WiFi hotspot in the...

/ April 21, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory 0021-21: 4/13/21 Microsoft Exchange Patches 2.0

Cybersecurity Threat Advisory 0021-21: 4/13/21 Microsoft Exchange Patches 2.0

Threat Update Due to the rise in targeted attacks on on-prem Microsoft Exchange servers, Microsoft, security vendors, and threat actors across the world have been looking for vulnerabilities within Microsoft Exchange services. This past Tuesday (4/13/2021), Microsoft has issued another...

/ April 16, 2021
Making sure your vendors are secure

Making sure your vendors are secure

We’ve all heard about major breaches and the cascading impact they can have across a variety of services. As an MSP, these upstream breaches are clearly out of your control, but you can and should be questioning whether the services...

/ April 15, 2021
Q&A: Ethical hacking and pen testing to protect against phishing

Q&A: Ethical hacking and pen testing to protect against phishing

Phishing continues to be one of the biggest threats to network security, which has led to “ethical hacking” being used to protect against it. If you’re wondering why methods like ethical hacking and pen testing are necessary to stop phishing,...

/ April 13, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical VMware Carbon Black Cloud Vulnerability

Cybersecurity Threat Advisory: Critical VMware Carbon Black Cloud Vulnerability

Threat Update A critical vulnerability was recently discovered in the VMWare Carbon Black Workload appliance that could allow an attacker to take control of a vulnerable system. A successful exploit would give an attacker the ability to obtain a valid...

/ April 12, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ATPs Exploiting FortiOS Vulnerabilities

Cybersecurity Threat Advisory: ATPs Exploiting FortiOS Vulnerabilities

Threat Update The FBI and CISA released a joint cybersecurity advisory documenting that a number of APTs have been seen in the wild scanning for three FortiOS vulnerabilities (CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812). These vulnerabilities, if exploited, can allow unauthorized remote...

/ April 9, 2021