Category: Security

Staying ahead of social engineering attacks
According to Verizon’s 2018 Data Breach Investigations Report, social engineering represents 93 percent of email breaches. While social engineering and spear phishing attacks have malicious intent to get something from the user, they are built differently from other attacks. They...

Cybersecurity at home: The growing residential MSP market
MSPs have been dipping their big toe in the residential managed services water for years. However, the convergence of value, customer convenience, and margins still hasn’t happened on a large scale. The global managed services market size is expected to...

Cybersecurity Threat Advisory: Coronavirus Related Phishing Campaigns
Advisory Overview There has been a rise in phishing campaigns related to Coronavirus. The campaigns vary in exact messaging, but many have imitated the World Health Organization or HR departments issuing warnings and work-from-home guidelines. SKOUT advises taking extra precaution...

Cybersecurity Threat Advisory: Remote Code Execution on Microsoft Exchange Server
Advisory Overview All unpatched versions of Microsoft Exchange Server are vulnerable to a remote code execution bug. The attack requires successful authentication to an Exchange Server. Attackers are scanning the internet for unpatched servers and attempting to authenticate with leaked...

AI could help make your clients more secure
There are so many security threats coming at us from all sides. It’s beyond our ability to keep up without the help of technology. Today, that means using artificial intelligence to help understand and scan for issues. As technology continues...

Coronavirus helps spread computer viruses
Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...

Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices
Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...

Tech Time Warp: Mocmex sneaks in via digital photo frame
“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...

AI-based security helps MSP alleviate email security pain
Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...

Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)
Advisory Overview Jenkins is an open source automation server used to build, test and deploy software projects. Attackers are rendering two services that are enabled by default in Jenkins (UDP multicast/broadcast and DNS multicast) unusable with Distributed Denial of Service...