Category: Security

Cybersecurity takeaways from the pandemic
It’s been about two months, and there has been a seismic shift in cybersecurity and the workforce in general. Work-from-home was always a long pondered goal of environmentalists and sociologists, but for many it has remained only in the realm...

Cybersecurity Threat Advisory: SAP Adaptive Server Enterprise Vulnerabilities
Advisory Overview Six critical vulnerabilities were recently disclosed in SAP Adaptive Server Enterprise that could allow hackers to execute arbitrary code, expose passwords, and elevate privileges. SKOUT recommends updating SAP ASE to the latest version. Technical detail and additional information...

Cybersecurity Threat Advisory: ConnectWise Automate Security Vulnerability
Advisory Overview ConnectWise issued a warning to its MSP customers about a security vulnerability found in Automate, a remote management platform, in which the API can be used by a remote user to make modifications to the Automate instance. Technical...

Restaurants, MSPs, and the post-pandemic world
“Would you like to supersize that?” Ah, remember the days when that was a simple question about the size of your fries or soda? Now, that question is fraught with cybersecurity issues that can lead to supersized cybersecurity issues.

Cybersecurity Threat Advisory: Microsoft Releases Patch for Critical Vulnerability SMBleed
Advisory Overview Microsoft has released a patch for a critical vulnerability affecting Server Message Block (SMB) protocol. This new vulnerability can be exploited to allow an attacker to leak information from kernel memory remotely and can be combined with additional...

Five emerging cybersecurity trends mid-way through 2020
As we approach the halfway point of 2020 (yes, hard to believe), this is an excellent time to look at the cybersecurity landscape to see what trends have emerged and how you can position your cybersecurity offerings for the remainder...

Cybersecurity Threat Advisory: Exim Mail Transfer Agent Actively Exploited by Russian
Advisory Overview According the NSA, Russian military cyber actors have been exploiting a vulnerability in Exim mail transfer agent (MTA) software in Unix-based systems. The vulnerability could allow hackers to execute commands with root privileges. SKOUT recommends updating Exim to...

Your customers need managed security services
Organisations today are locked in an endless battle to do more with less. Recent years have seen an increase in both the frequency and sophistication of cyberattacks, yet many businesses lack the necessary in-house resources, time and budget to effectively...

Ask an MSP Expert: How can an RMM automate security offerings?
Q: I have heard that adding an RMM tool can improve delivery of our managed security services offering for customers, specifically through automation. How can an RMM tool do this? If the new situation that MSPs and their clients find...

Tech Time Warp: Klez.H virus confuses with spoofed emails
It is possible the creator of Klez was rather indecisive. The malware, which confounded computer users in the early 2000s, was all at once a virus, a worm, and a Trojan horse. Basically, Klez contained every trick in the hacker...