Category: Security
Cybersecurity Threat Advisory: Adobe Out-of-Band Security Patches
Advisory Overview Adobe Creative Cloud is a popular platform for the use of many different Adobe applications and services. Recently, security researchers uncovered a database cache which was not properly secured to prevent access by unauthorized parties. A database cache...
MSPs and schools can be a good cybersecurity partnership
Achievement tests, rumbling school buses, and Friday night football are a few signs that the educational ecosystem is up and running again for another academic year. Schools are increasingly on the radar of hackers, who view schools as repositories of...
Cybersecurity Threat Advisory: Cisco Addresses Serious Flaws in Wireless Access Points
Advisory Overview Cisco, one of the leading networking hardware manufacturers, routinely updates and patches components of their product line. Recently, one of these update sets applied to Cisco Aironet wireless access points (WAP’s). WAP’s extend the coverage of a WIFI...
New tools could help users be more security savvy
When it comes to security, your end users are often a weak link in your safety regimen. It’s not because they are malicious or careless. It’s because they often don’t know any better, making them vulnerable to social engineering and...
Cybersecurity Threat Advisory: D-Link Routers Unauthenticated Vulnerability
Advisory Overview Several older D-Link routers have a known vulnerability that can allow an attacker to use a legitimate communications channel in illegitimate ways. Through this vulnerability, and attacker could send program code or files that can allow the attacker...
Cybersecurity Threat Advisory: New Microsoft NTLM Flaws May Allow Full Domain Compromise
Advisory Overview NTLM is one of several methods that can be used to authenticate and confirm the identity of a user within a Windows-based network. Two flaws in NTLM were recently found which could allow an attacker to trick NTLM...
Cybersecurity Threat Advisory: TransUnion Incident: Credit Info Exposed
Advisory Overview: TransUnion, a credit reporting bureau, recently began notifying some consumers that their credit information had been obtained by an unauthorized person or persons. The access occurred when a threat actor illegally accessed a TransUnion website that allows businesses...
AI meets vishing
Artificial intelligence is making its presence felt in everything from Amazon’s Alexa to factory floor industrial applications. AI-infused software is ramping up its predictive capabilities and strengthening its algorithmic methodology to become more accurate. Of course, AI can be abused....
How to take a security-centric approach with your RMM
Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network? Cybercriminals are very good at...
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal
Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...