Category: Security
Cybersecurity preparations for the holiday season
‘Twas the night before Christmas, and all through the network, not a creature, was stirring, not even a virus. When out on the server, there arose such a clatter, the technician sprang to their portal to see what was the...
Tech Time Warp: Teens left their fingerprints on the Goner worm
Much like the “Wet Bandits” left their signature (running water in a stopped-up sink) on home burglaries in the holiday classic Home Alone, the Israeli teenagers arrested in December 2001 for spreading the Goner worm signed their work — and...
Cybersecurity Threat Advisory: Email Bombing
Advisory Overview Threat actors have recently increased attempts to take email servers offline by overloading the servers with thousands of email messages (known as “email bombing”). This attack is similar to a Denial of Service (DOS) attack, where hundreds of...
The growth of IoMT and what it means for MSPs
We know that IoT is transforming the landscape for MSPs. MSPs that once simply had to monitor and maintain a bare-bones network, now must contend with everything from connected coffeemakers to myriad BYOD items. There is a sub-variant of IoT that’s...
Tech Time Warp: Columbia researchers find IoT vulnerability
The headlines were inflammatory in every sense of the word: In November 2011, two Columbia University researchers recognized a security vulnerability in HP printers and set one ablaze. Professors Salvatore Stolfo and Ang Cui realized that every time an HP...
Cities have a massive need for cybersecurity
Cities are increasingly making headlines for being crippled by ransomware and other attacks. Such vulnerability isn’t surprising, since municipalities have a growing number of attack vectors and a pool of taxpayer or insurance money that hackers find too tempting to resist....
Cybersecurity Threat Advisory: McAfee Antivirus and Symantec Endpoint LPE Flaw
Advisory Overview Recently, both McAfee and Symantec anti-malware tools were discovered to have vulnerabilities that allowed a threat actor to overcome the protection systems that these tools typically provide. While the attack requires the threat actor to have Administrative privileges...
Cybersecurity Threat Advisory: Zombieload targeting 8th and 9th Generation Intel CPU’s
Advisory Overview As with several other exploits targeted at how Intel processors handle digital operations, “Zombieload” is an exploit used by threat actors to compromise information being processed by an Intel CPU. Some vulnerabilities allow a threat actor to steal...
Growing confidence and emerging gaps in cloud security
For modern organizations, digital transformation is increasingly the only game in town. CIOs are turning to multiple cloud providers in droves for new app-based models, driving enhanced business agility to meet ever-changing market demands. Yet security remains a constant challenge....
Cybersecurity defense: Racquetball, rest, and service
I frequently talk to MSP owners or their technicians and often find them harried and stretched for time. While those descriptors could apply to scores of professions, the stakes of feeling frazzled are high for MSPs. The world of cybersecurity...