Category: Security
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices
Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...
Tech Time Warp: Mocmex sneaks in via digital photo frame
“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...
AI-based security helps MSP alleviate email security pain
Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...
Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)
Advisory Overview Jenkins is an open source automation server used to build, test and deploy software projects. Attackers are rendering two services that are enabled by default in Jenkins (UDP multicast/broadcast and DNS multicast) unusable with Distributed Denial of Service...
Tech Time Warp: The arrest of hacker Kevin Mitnick
The story of the man who calls himself the “world’s most famous hacker” contains a moral: It’s often the human element, not the high-tech, that allows intrusion into the most secure of systems — and allows hackers to exist in...
Threat of toll fraud emerges
MSPs have an increasing amount of cyber turf to defend with the rapid proliferation of IoT devices and interconnected networks. Add to the mix the arsenal of weapons the bad guys have, and an MSP could be forgiven for overlooking...
Cybersecurity Threat Advisory: Cisco Firepower Management Center Vulnerability
Advisory Overview Security researchers discovered a critical flaw in the web interface of the Cisco Firepower management center (FMC). Cisco Firepower management center is a platform for managing Cisco network security solutions such as firewalls, application control, intrusion prevention, URL...
Ask an MSP Expert: How can I make sure my customers are secure online?
Q: One of my customers recently fell victim to a suspicious download from a fraudulent website. How can I prevent this in the future? Attacks through websites are not uncommon. As cybercriminals become more sophisticated with attack vectors such as drive-by downloads and malvertising,...
Tech Time Warp: The 2005 Academy Awards phone hack
When Hollywood’s elite stroll the red carpet at the 92nd Academy Awards on February 9, they’ll need to watch out for flashing cameras, Ryan Seacrest, and… hackers? It’s happened before.
Conversation hijacking emerges as a cybersecurity threat
Recent research by Barracuda Networks highlights the growing dangers of “conversation hijacking.” According to the research, an analysis of approximately 500,000 monthly email attacks shows a 400 percent increase in these types of attacks. There were approximately 500 incidents in...
