Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Adobe Out-of-Band Security Patches

Cybersecurity Threat Advisory: Adobe Out-of-Band Security Patches

Advisory Overview Adobe Creative Cloud is a popular platform for the use of many different Adobe applications and services. Recently, security researchers uncovered a database cache which was not properly secured to prevent access by unauthorized parties. A database cache...

/ October 23, 2019
MSPs and schools can be a good cybersecurity partnership

MSPs and schools can be a good cybersecurity partnership

Achievement tests, rumbling school buses, and Friday night football are a few signs that the educational ecosystem is up and running again for another academic year. Schools are increasingly on the radar of hackers, who view schools as repositories of...

/ October 23, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Addresses Serious Flaws in Wireless Access Points

Cybersecurity Threat Advisory: Cisco Addresses Serious Flaws in Wireless Access Points

Advisory Overview Cisco, one of the leading networking hardware manufacturers, routinely updates and patches components of their product line. Recently, one of these update sets applied to Cisco Aironet wireless access points (WAP’s). WAP’s extend the coverage of a WIFI...

/ October 21, 2019
New tools could help users be more security savvy

New tools could help users be more security savvy

When it comes to security, your end users are often a weak link in your safety regimen. It’s not because they are malicious or careless. It’s because they often don’t know any better, making them vulnerable to social engineering and...

/ October 21, 2019

Cybersecurity Threat Advisory: D-Link Routers Unauthenticated Vulnerability

Advisory Overview Several older D-Link routers have a known vulnerability that can allow an attacker to use a legitimate communications channel in illegitimate ways. Through this vulnerability, and attacker could send program code or files that can allow the attacker...

/ October 17, 2019

Cybersecurity Threat Advisory: New Microsoft NTLM Flaws May Allow Full Domain Compromise

Advisory Overview NTLM is one of several methods that can be used to authenticate and confirm the identity of a user within a Windows-based network. Two flaws in NTLM were recently found which could allow an attacker to trick NTLM...

/ October 17, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TransUnion Incident: Credit Info Exposed

Cybersecurity Threat Advisory: TransUnion Incident: Credit Info Exposed

Advisory Overview: TransUnion, a credit reporting bureau, recently began notifying some consumers that their credit information had been obtained by an unauthorized person or persons. The access occurred when a threat actor illegally accessed a TransUnion website that allows businesses...

/ October 17, 2019
AI meets vishing

AI meets vishing

Artificial intelligence is making its presence felt in everything from Amazon’s Alexa to factory floor industrial applications. AI-infused software is ramping up its predictive capabilities and strengthening its algorithmic methodology to become more accurate. Of course, AI can be abused....

/ October 17, 2019 / 1 Comment
How to take a security-centric approach with your RMM

How to take a security-centric approach with your RMM

Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network?  Cybercriminals are very good at...

/ October 14, 2019
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...

/ October 11, 2019