Category: Security
Tech Time Warp: MyLife virus tempts users with screensavers
Sometimes a computer user gets tired of flying toasters. That was the gamble taken by the creators of MyLife, a worm with multiple variants infecting PCs in March and April 2002.
Cybersecurity Threat Advisory: ZyXEL NAS RCE Vulnerability (CVE-2020-9054)
Advisory Overview Several ZyXEL NAS devices are vulnerable to Remote Code Execution (RCE). The vulnerability could potentially allow an attacker to execute remote commands as root. A patch has been released, but many devices are at an end of life...
Staying ahead of social engineering attacks
According to Verizon’s 2018 Data Breach Investigations Report, social engineering represents 93 percent of email breaches. While social engineering and spear phishing attacks have malicious intent to get something from the user, they are built differently from other attacks. They...
Cybersecurity at home: The growing residential MSP market
MSPs have been dipping their big toe in the residential managed services water for years. However, the convergence of value, customer convenience, and margins still hasn’t happened on a large scale. The global managed services market size is expected to...
Cybersecurity Threat Advisory: Coronavirus Related Phishing Campaigns
Advisory Overview There has been a rise in phishing campaigns related to Coronavirus. The campaigns vary in exact messaging, but many have imitated the World Health Organization or HR departments issuing warnings and work-from-home guidelines. SKOUT advises taking extra precaution...
Cybersecurity Threat Advisory: Remote Code Execution on Microsoft Exchange Server
Advisory Overview All unpatched versions of Microsoft Exchange Server are vulnerable to a remote code execution bug. The attack requires successful authentication to an Exchange Server. Attackers are scanning the internet for unpatched servers and attempting to authenticate with leaked...
AI could help make your clients more secure
There are so many security threats coming at us from all sides. It’s beyond our ability to keep up without the help of technology. Today, that means using artificial intelligence to help understand and scan for issues. As technology continues...
Coronavirus helps spread computer viruses
Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices
Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...
Tech Time Warp: Mocmex sneaks in via digital photo frame
“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...
