Category: Security
Cybersecurity Threat Advisory: ConnectWise Automate Security Vulnerability
Advisory Overview ConnectWise issued a warning to its MSP customers about a security vulnerability found in Automate, a remote management platform, in which the API can be used by a remote user to make modifications to the Automate instance. Technical...
Restaurants, MSPs, and the post-pandemic world
“Would you like to supersize that?” Ah, remember the days when that was a simple question about the size of your fries or soda? Now, that question is fraught with cybersecurity issues that can lead to supersized cybersecurity issues.
Cybersecurity Threat Advisory: Microsoft Releases Patch for Critical Vulnerability SMBleed
Advisory Overview Microsoft has released a patch for a critical vulnerability affecting Server Message Block (SMB) protocol. This new vulnerability can be exploited to allow an attacker to leak information from kernel memory remotely and can be combined with additional...
Five emerging cybersecurity trends mid-way through 2020
As we approach the halfway point of 2020 (yes, hard to believe), this is an excellent time to look at the cybersecurity landscape to see what trends have emerged and how you can position your cybersecurity offerings for the remainder...
Cybersecurity Threat Advisory: Exim Mail Transfer Agent Actively Exploited by Russian
Advisory Overview According the NSA, Russian military cyber actors have been exploiting a vulnerability in Exim mail transfer agent (MTA) software in Unix-based systems. The vulnerability could allow hackers to execute commands with root privileges. SKOUT recommends updating Exim to...
Your customers need managed security services
Organisations today are locked in an endless battle to do more with less. Recent years have seen an increase in both the frequency and sophistication of cyberattacks, yet many businesses lack the necessary in-house resources, time and budget to effectively...
Ask an MSP Expert: How can an RMM automate security offerings?
Q: I have heard that adding an RMM tool can improve delivery of our managed security services offering for customers, specifically through automation. How can an RMM tool do this? If the new situation that MSPs and their clients find...
Tech Time Warp: Klez.H virus confuses with spoofed emails
It is possible the creator of Klez was rather indecisive. The malware, which confounded computer users in the early 2000s, was all at once a virus, a worm, and a Trojan horse. Basically, Klez contained every trick in the hacker...
Cybersecurity Threat Advisory: Office 365 MFA Bypass Phishing Attack
Advisory Overview A new type of Office 365 Phishing attack uses the legitimate Microsoft login page to bypass multi-factor authentication. The attack grants certain permissions to threat actors, compromising the target user’s account and its data. SKOUT advises businesses to...
Passwords in a pandemic
World Password Day was celebrated earlier this month with some sobering statistics that may have people rethinking the use of their daughter’s middle name or favorite Italian dish as the basis for all of their security. MSPs can only hope...
