Category: Security

Building a defense from social engineering attacks
Last week Smarter MSP examined the security threat that social engineering poses to organizations of all sizes. Social engineering is a technique that hackers use to gain access to an organization’s network, without having to break down the metaphorical door....

Cybersecurity Threat Advisory: Zero-Day Privilege Escalation Vulnerability in Apple’s iOS
What is the threat? Recently, Google’s Project Zero team reported a new zero-day vulnerability discovered in Apple’s iOS. They identified several malicious/fraudulent applications available for download in the app store. These applications leave iPhones susceptible to vulnerabilities that put the...

Cybersecurity Threat Advisory: Zero Day Microsoft Exchange PrivExchange Vulnerability
What is the threat? Remote attackers can exploit a vulnerability that has been discovered in Microsoft Exchange to gain Domain Controller admin privileges using the credentials of an Exchange Mailbox user. The attacker must exploit a combination of flaws to...

Cybersecurity Threat Advisory: RogueRobin Advanced Malware
What is the threat? Cyber researchers have recently found that there’s a custom-developed malware known as RogueRobin which uses multiple techniques to upload and download files to/from affected host(s). It was reported that the cyber threat adversary, DarkHydrus, is responsible...

Cybersecurity Threat Advisory: Cisco Flaw Leaves Networks Wide Open
What is the threat? Security researchers identified a critical and unpatched vulnerability (CVE-2018-15439) in the widely deployed Cisco Small Business Switch Software that could allow a remote attacker to bypass security restrictions and gain full admin access. The default configuration...

Cybersecurity Threat Advisory: Global DNS Hijacking Campaign
What is the threat? Organized cyber attackers have hijacked many Domain Name Servers (DNS) and manipulated them in ways which allow them to redirect traffic to/from a victim network and harvest usernames, passwords, and domain credentials for organizations which they...

Tech Time Warp: Prince Philip’s inbox gets hacked
Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...

Cybersecurity Threat Advisory: Linux Systemd Exploit
What is the threat? A core component in Linux that manages system processes known as “systemd” could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. These vulnerabilities reside in the “systemd-journald” service that...

Need for zero-trust IT environments bodes well for MSPs
As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...

Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager
What is the threat? A new, zero-day exploit was discovered targeting several victims in the Middle East and Asia. The vulnerability affects Microsoft Windows and Microsoft server. The Microsoft Windows Kernel Transaction Manager(KTM)is vulnerable to a race condition because it...