Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Two vulnerabilities found in D-Link NAS devices

Cybersecurity Threat Advisory: Two vulnerabilities found in D-Link NAS devices

Two vulnerabilities were found in legacy D-Link products that have reached end-of-life (EoL) status. The vulnerabilities can cause command injection and backdoor account to these devices. This Cybersecurity Threat Advisory discusses the impact of the threat, as well as recommendations...

/ April 10, 2024
Top cybersecurity misconfigurations MSPs should address

Top cybersecurity misconfigurations MSPs should address

As we embrace spring, the fall seems to be nothing but a memory. While 2024 holds new trends, threats, and opportunities for MSPs, there are still a few things to keep in mind from 2023. In October of last year,...

/ April 9, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: XZ Utils supply chain vulnerability

Cybersecurity Threat Advisory: XZ Utils supply chain vulnerability

A supply chain vulnerability was found in XZ Utils that creates a backdoor into OpenSSH and can lead to remote code execution (RCE). Read this Cybersecurity Threat Advisory to learn about this supply chain vulnerability and how to reduce your...

/ April 5, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments
Healthcare wearables are a growing opportunity for MSPs

Healthcare wearables are a growing opportunity for MSPs

Healthcare wearables are exploding in popularity, but their use goes beyond the fun apps that allow you to track how many steps you’ve taken each day. Today, heart rate, blood sugar, oxygen levels, blood pressure, and other parameters are monitored...

/ April 4, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TA558 phishing campaign

Cybersecurity Threat Advisory: TA558 phishing campaign

The threat actor TA558 is conducting a phishing campaign targeting various sectors in Latin America, intending to deploy the remote access tool known as Venom RAT. Barracuda MSP encourages organizations to follow the recommendations detailed in this Cybersecurity Threat Advisory...

/ April 3, 2024
Ransomware 2024: The new battleground is your data, not just your files

Ransomware 2024: The new battleground is your data, not just your files

Every year, cybercriminals devise new ways to steal credentials, access sensitive data, and disrupt business. In 2024, the most significant cybersecurity challenge may actually be overcoming a familiar threat: ransomware. According to the World Economic Forum (WEF), ransomware activity was up...

/ April 2, 2024
How artificial intelligence is changing the threat landscape

How artificial intelligence is changing the threat landscape

the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

/ April 1, 2024
Data tampering is an underrated threat — get your backup ready

Data tampering is an underrated threat — get your backup ready

World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

/ March 31, 2024