Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Severe N-able vulnerabilities

Cybersecurity Threat Advisory: Severe N-able vulnerabilities

Two critical vulnerabilities were disclosed by N-able in the N-central RMM platform, with one having a maximum severity rating. To help safeguard you and your customers’ environments, please review the best practices outlined in this Cybersecurity Threat Advisory. What is...

/ November 18, 2025
Why MSPs need to adapt email defenses in the GenAI era

Why MSPs need to adapt email defenses in the GenAI era

Artificial intelligence (AI) is a double-edged sword: The same technology that can draft emails or write software code can also be exploited for nefarious purposes. For example, today, cybercriminals are leveraging AI to enhance email-based attacks, such as phishing, by...

/ November 17, 2025 / 6 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco and Citrix zero-day exploits

Cybersecurity Threat Advisory: Cisco and Citrix zero-day exploits

An advanced threat actor is exploiting two previously disclosed zero-day vulnerabilities in Cisco Identity Services Engine (ISE) and Citrix NetScaler ADC to deploy custom malware and maintain persistence on targeted networks. Reports indicate the attacker is chaining appliance exploits to...

/ November 17, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Windows Kernel zero-day vulnerability

Cybersecurity Threat Advisory: Critical Windows Kernel zero-day vulnerability

CVE-2025-62215 is a Windows Kernel flaw that lets attackers escalate to SYSTEM privileges, persist, access data, and move laterally. Attackers are actively exploiting this zero-day in the wild. Review this Cybersecurity Threat Advisory for best practices and recommendations to mitigate...

/ November 14, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical WatchGuard Fireware vulnerability

Cybersecurity Threat Advisory: Critical WatchGuard Fireware vulnerability

CISA has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog following confirmed exploitation in the wild. This critical flaw allows unauthenticated remote code execution (RCE) via malformed IKEv2 VPN packets in WatchGuard Fireware. Continue reading this Cybersecurity Threat Advisory...

/ November 14, 2025
The 2025 BYOD Playbook: Practical steps for scalable security

The 2025 BYOD Playbook: Practical steps for scalable security

This week we continue our series exploring bring your own device (BYOD) in 2025. The state of BYOD in the workplace has evolved since its pandemic-era popularity. As BYOD policies adapt in 2025, managed service providers (MSPs) face mounting pressure...

/ November 11, 2025
Barracuda Assistant: Your AI-powered partner for faster, smarter security operations

Barracuda Assistant: Your AI-powered partner for faster, smarter security operations

We’re thrilled to introduce Barracuda Assistant, powered by Barracuda AI — a natural language interface that enables users of all skill levels to quickly navigate threats, troubleshoot issues and access actionable insights through simple, conversational interaction. Available now in BarracudaONE, Barracuda Assistant transforms...

/ November 10, 2025
MSSPs should brace for the AI-driven vulnerability wave

MSSPs should brace for the AI-driven vulnerability wave

Managed security service providers (MSSPs) prepare for a surge of application vulnerabilities—flaws that attackers are likely to exploit faster than ever. AI-generated code: The new normal A Sapio Research survey of 450 IT professionals in the U.S. and Europe found...

/ November 6, 2025
The BYOD Reality: MSPs’ path to data-centric security

The BYOD Reality: MSPs’ path to data-centric security

The BYOD revolution is no longer a trend—it’s the new workplace norm. Today, 95 percent of organizations allow personal devices at work, and 82 percent actively use BYOD policies. Market growth is accelerating, with Mordor Intelligence projecting $132.22B by 2025...

/ November 4, 2025
ransomware
Email breach delays can multiply ransomware risk eight-fold

Email breach delays can multiply ransomware risk eight-fold

Email breaches affect almost all organizations. The new Email Security Breach Report 2025 reveals the worrying fact that 78 percent of organizations experienced an email breach in the last year. Only half of them detected the breach within an hour....

/ November 3, 2025