Category: Security
Understanding email threats: The foundation of email security
In today’s digital landscape, email remains a fundamental communication tool for businesses. However, its ubiquity makes it a prime target for cyber threats. Understanding these threats is the first step in fortifying your email security. In this blog post, we’ll...
Cybersecurity Threat Advisory: Cisco Smart Install vulnerability
There has been a surge in malicious cyber activities exploiting the Cisco Smart Install (SMI) legacy feature. This legacy feature if enabled by default on many Cisco devices, allowing threat actors to gain unauthorized access to network devices, allowing them...
Cybersecurity Threat Advisory: Windows SAC and SmartScreen design flaws
A design flaw within Windows Smart App Control (SAC) and SmartScreen has allowed attackers to launch programs without triggering a security warning. Review this Cybersecurity Threat Advisory to find out how to prevent attackers from exploiting this flaw and keep...
Cybersecurity Threat Advisory: Critical zero-day vulnerability in Apache OFBiz
CVE-2024-38856 is a new Apache OFBiz ERP system critical zero-day vulnerability. If you are using this system, please continue reading this Cybersecurity Threat Advisory to learn which steps you should take to mitigate your risk. What is the threat? Researchers...
Predictions for the future of AI in cybersecurity
Threat actors are improving their attacks by leveraging artificial intelligence (AI) in every way. AI makes every attack from deepfakes to credential stuffing cheaper, better, and faster. The good news is that the security industry also has access to AI capabilities, and AI-enhanced...
Cybersecurity Threat Advisory: VMware ESXi flaw exploited by ransomware group
A VMware ESXi vulnerability, known as CVE-2024-37085, has been discovered and it is actively exploited by several ransomware groups. Review this Cybersecurity Threat Advisory to learn how to limit the impact of this flaw. What is the threat? CVE-2024-37085 is an...
Threat Spotlight: How company size affects the email threats targeting your business
It takes less than a minute for someone to fall for a phishing scam. According to the 2024 Data Breach Investigations Report, the median time for a recipient to click on a malicious link after opening the email is 21 seconds, followed by...
Does your MSP portfolio need a new security vendor?
Changing technology vendors can be a daunting and stressful proposition for a managed service provider. Not only do you risk internal operational disruption and performance issues during and after the transition, but you also need to make the switch without...