Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices

Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices

Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...

/ February 21, 2020
Tech Time Warp: Mocmex sneaks in via digital photo frame

Tech Time Warp: Mocmex sneaks in via digital photo frame

“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...

/ February 21, 2020
AI-based security helps MSP alleviate email security pain

AI-based security helps MSP alleviate email security pain

Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...

/ February 20, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)

Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)

Advisory Overview Jenkins is an open source automation server used to build, test and deploy software projects. Attackers are rendering two services that are enabled by default in Jenkins (UDP multicast/broadcast and DNS multicast) unusable with Distributed Denial of Service...

/ February 19, 2020
Tech Time Warp: The arrest of hacker Kevin Mitnick

Tech Time Warp: The arrest of hacker Kevin Mitnick

The story of the man who calls himself the “world’s most famous hacker” contains a moral: It’s often the human element, not the high-tech, that allows intrusion into the most secure of systems — and allows hackers to exist in...

/ February 14, 2020
Threat of toll fraud emerges

Threat of toll fraud emerges

MSPs have an increasing amount of cyber turf to defend with the rapid proliferation of IoT devices and interconnected networks. Add to the mix the arsenal of weapons the bad guys have, and an MSP could be forgiven for overlooking...

/ February 13, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Firepower Management Center Vulnerability

Cybersecurity Threat Advisory: Cisco Firepower Management Center Vulnerability

Advisory Overview Security researchers discovered a critical flaw in the web interface of the Cisco Firepower management center (FMC). Cisco Firepower management center is a platform for managing Cisco network security solutions such as firewalls, application control, intrusion prevention, URL...

/ February 10, 2020
Ask an MSP Expert: How can I make sure my customers are secure online?

Ask an MSP Expert: How can I make sure my customers are secure online?

Q: One of my customers recently fell victim to a suspicious download from a fraudulent website. How can I prevent this in the future? Attacks through websites are not uncommon. As cybercriminals become more sophisticated with attack vectors such as drive-by downloads and malvertising,...

/ February 10, 2020
Tech Time Warp: The 2005 Academy Awards phone hack

Tech Time Warp: The 2005 Academy Awards phone hack

When Hollywood’s elite stroll the red carpet at the 92nd Academy Awards on February 9, they’ll need to watch out for flashing cameras, Ryan Seacrest, and… hackers? It’s happened before.

/ February 7, 2020
Conversation hijacking emerges as a cybersecurity threat

Conversation hijacking emerges as a cybersecurity threat

Recent research by Barracuda Networks highlights the growing dangers of “conversation hijacking.” According to the research, an analysis of approximately 500,000 monthly email attacks shows a 400 percent increase in these types of attacks. There were approximately 500 incidents in...

/ February 6, 2020