Category: Security

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link...

/ July 15, 2024
PHI Hackers
Tips for MSPs to protect PHI from hackers

Tips for MSPs to protect PHI from hackers

Hackers love personal healthcare information (PHI). Health records contain a trove of highly saleable information that can fetch high prices on the dark web. Enlance Health found that in the past two years alone, over 800 security breaches targeting healthcare...

/ July 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Four vulnerabilities were found in Gogs Git Service, impacting multiple versions up to 0.13.0. The vulnerabilities can impact the confidentiality and availability of data, however, code execution is possible. Continue reading this Cybersecurity Threat Advisory to protect your accounts and...

/ July 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

A new ransomware-as-a-service (RaaS), known as Eldorado, recently emerged, introducing locker variants for both VMware ESXi and Windows systems. Eldorado has rapidly demonstrated its ability to inflict severe damage on victims’ data, reputation, and business continuity. Review this Cybersecurity Threat...

/ July 10, 2024
Microsoft 365
Is your client’s Microsoft 365 data protected?

Is your client’s Microsoft 365 data protected?

According to some estimates, over 1 million companies use Microsoft 365 (M365). Because they’re working with a trusted brand, businesses often think their data stored on the platform is protected by Microsoft, but that is not the case – Microsoft doesn’t natively...

/ July 10, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RCE vulnerability in Ghostscript

Cybersecurity Threat Advisory: RCE vulnerability in Ghostscript

A Ghostscript remote code execution (RCE) vulnerability, tracked as CVE-2024-29510 (with a CVSS rating of 5.5), is currently being exploited. This exploit can allow attackers to bypass the -dSAFER sandbox and execute code remotely. Review this Cybersecurity Threat Advisory to...

/ July 9, 2024
Tales from the security operations center (SOC)

Tales from the security operations center (SOC)

With the frequency and variety of cyberattacks increasing daily, the need for comprehensive security measures has never been more critical. For analysts staffing a security operations center (SOC) for a global extended detection and response (XDR) service, each day brings...

/ July 4, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical update for Juniper Networks routers

Cybersecurity Threat Advisory: Critical update for Juniper Networks routers

A high-severity vulnerability in Juniper Networks, known as CVE-2024-2973, has been exploited. The following flaw affects some of its router products and users need to address it early enough to avoid exploitation. Review this Cybersecurity Threat Advisory in full to...

/ July 3, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: OpenSSH vulnerability threatens remote code execution

Cybersecurity Threat Advisory: OpenSSH vulnerability threatens remote code execution

OpenSSH maintainers have released security updates to contain a critical security flaw that could result in unauthenticated remote code execution with root privileges in glibc-based Linux systems. Please review the information in this Cybersecurity Threat Advisory to limit your potential...

/ July 2, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical GitLab vulnerabilities

Cybersecurity Threat Advisory: Critical GitLab vulnerabilities

GitLab has released multiple security updates that address a total of 14 vulnerabilities. Attackers can exploit one of the vulnerabilities to run pipelines as any user. Read this Cybersecurity Threat Advisory in detail to learn more about how you can...

/ July 2, 2024