Category: Security

Cybersecurity preparations for the holiday season

Cybersecurity preparations for the holiday season

‘Twas the night before Christmas, and all through the network, not a creature, was stirring, not even a virus. When out on the server, there arose such a clatter, the technician sprang to their portal to see what was the...

/ December 11, 2019 / 1 Comment
Tech Time Warp: Teens left their fingerprints on the Goner worm

Tech Time Warp: Teens left their fingerprints on the Goner worm

Much like the “Wet Bandits” left their signature (running water in a stopped-up sink) on home burglaries in the holiday classic Home Alone, the Israeli teenagers arrested in December 2001 for spreading the Goner worm signed their work — and...

/ December 6, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Email Bombing

Cybersecurity Threat Advisory: Email Bombing

Advisory Overview Threat actors have recently increased attempts to take email servers offline by overloading the servers with thousands of email messages (known as “email bombing”). This attack is similar to a Denial of Service (DOS) attack, where hundreds of...

/ December 6, 2019
The growth of IoMT and what it means for MSPs

The growth of IoMT and what it means for MSPs

We know that IoT is transforming the landscape for MSPs. MSPs that once simply had to monitor and maintain a bare-bones network, now must contend with everything from connected coffeemakers to myriad BYOD items. There is a sub-variant of IoT that’s...

/ December 4, 2019
Tech Time Warp: Columbia researchers find IoT vulnerability

Tech Time Warp: Columbia researchers find IoT vulnerability

The headlines were inflammatory in every sense of the word: In November 2011, two Columbia University researchers recognized a security vulnerability in HP printers and set one ablaze. Professors Salvatore Stolfo and Ang Cui realized that every time an HP...

/ November 29, 2019
Cities have a massive need for cybersecurity

Cities have a massive need for cybersecurity

Cities are increasingly making headlines for being crippled by ransomware and other attacks. Such vulnerability isn’t surprising, since municipalities have a growing number of attack vectors and a pool of taxpayer or insurance money that hackers find too tempting to resist....

/ November 27, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: McAfee Antivirus and Symantec Endpoint LPE Flaw

Cybersecurity Threat Advisory: McAfee Antivirus and Symantec Endpoint LPE Flaw

Advisory Overview Recently, both McAfee and Symantec anti-malware tools were discovered to have vulnerabilities that allowed a threat actor to overcome the protection systems that these tools typically provide. While the attack requires the threat actor to have Administrative privileges...

/ November 22, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zombieload targeting 8th and 9th Generation Intel CPU’s

Cybersecurity Threat Advisory: Zombieload targeting 8th and 9th Generation Intel CPU’s

Advisory Overview As with several other exploits targeted at how Intel processors handle digital operations, “Zombieload” is an exploit used by threat actors to compromise information being processed by an Intel CPU. Some vulnerabilities allow a threat actor to steal...

/ November 20, 2019
Growing confidence and emerging gaps in cloud security

Growing confidence and emerging gaps in cloud security

For modern organizations, digital transformation is increasingly the only game in town. CIOs are turning to multiple cloud providers in droves for new app-based models, driving enhanced business agility to meet ever-changing market demands. Yet security remains a constant challenge....

/ November 14, 2019
Cybersecurity defense: Racquetball, rest, and service

Cybersecurity defense: Racquetball, rest, and service

I frequently talk to MSP owners or their technicians and often find them harried and stretched for time. While those descriptors could apply to scores of professions, the stakes of feeling frazzled are high for MSPs. The world of cybersecurity...

/ November 13, 2019