Category: Security

ad hoc
Securing ad hoc networks: Essential strategies for MSPs

Securing ad hoc networks: Essential strategies for MSPs

When Hurricane Helene tore a path of destruction from the Gulf Coast to the North Carolina mountains during the summer of 2024, cell phone towers were toppled, and internet service was knocked out. However, emergency responders were not left completely...

/ December 10, 2024
holiday email scams
’Tis the season to avoid holiday email scams

’Tis the season to avoid holiday email scams

Beware of common holiday email scams. As the holidays approach, businesses are busier than ever, and cybercriminals know it. Along with cheer, joy, and giving, the holidays also bring an unfortunate surge in cyber scams. As businesses tackle everything from...

/ December 9, 2024 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for

Vulnerabilities were discovered in SonicWall NetExtender, CVE-2024-29014, and Palo Alto GlobalConnect, CVE-2024-5921, which can lead to remote code execution (RCE). Continue reading this Cybersecurity Threat Advisory to limit your exposure to these vulnerabilities. What is the threat? The vulnerabilities exhibit...

/ December 5, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability

Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. Review this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ December 5, 2024
managed XDR
7 cybersecurity trends highlighting the case for managed XDR

7 cybersecurity trends highlighting the case for managed XDR

As the digital threat landscape becomes increasingly sophisticated, managed service providers (MSPs) face mounting pressure to adapt their cybersecurity offerings. One of the most effective solutions available today is managed extended detection and response (XDR). This approach integrates multiple layers...

/ December 5, 2024
Predicts
Threat Spotlight: Phishing techniques to look out for in 2025

Threat Spotlight: Phishing techniques to look out for in 2025

Over the last few months, Barracuda’s threat analysts have reported on several advanced phishing techniques implemented by attackers to evade security controls and make malicious emails look more convincing, legitimate, and personal. In this blog post, we look at how these and...

/ December 4, 2024
email security
Essential components for cloud email security

Essential components for cloud email security

Attacks are getting more sophisticated, and organizations need a fresh approach. The email threat landscape is evolving fast. From sophisticated phishing attacks to business email compromise (BEC) attacks, bad actors continually find new ways to outsmart existing defenses. For businesses...

/ December 3, 2024
fleets
Securing clients’ fleets: Unlocking new opportunities for MSPs

Securing clients’ fleets: Unlocking new opportunities for MSPs

The market for cybersecurity services as it pertains to autonomous and non-autonomous vehicles is growing. According to Allied Market Research, the estimated industry size of cybersecurity for the autonomous vehicles market was valued at $356.0 million in 2023 and is...

/ December 2, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: 7-Zip vulnerability

Cybersecurity Threat Advisory: 7-Zip vulnerability

A security vulnerability in 7-Zip allows remote attackers to bypass defenses and execute malicious code via specially crafted archives. Read this Cybersecurity Threat Advisory to learn how to mitigate your risk from this new threat. What is the threat? The...

/ November 28, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RomCom exploits vulnerabilities

Cybersecurity Threat Advisory: RomCom exploits vulnerabilities

Recent reports have uncovered that a threat actor known as RomCom has been exploiting two zero-day vulnerabilities, one in Mozilla Firefox and another in Microsoft Windows, to deploy their proprietary backdoor malware. These vulnerabilities, CVE-2024-9680 and CVE-2024-49039, have been actively...

/ November 28, 2024