Category: Security
Cybersecurity Threat Advisory: New QBot malware delivering campaigns discovered
A new QBot malware campaign has been discovered. Using hijacked business emails, bad actors are distributing PDF and WSF file formats in reply-chain phishing emails to distribute malware. The campaign is designed to steal sensitive data from the target system,...
Beware! USB drop attacks persist
MSPs have a pile of challenges when it comes to defending clients from cyber threats, but sometimes little can be done when physical and human elements are involved. One of the oldest “tricks” in the hackers’ arsenal is the “USB...
MSPs can fill the data management skills gap created by AI
With the rise of artificial intelligence, an appreciation of the business value of data is now finally starting to increase. A global survey of 4,777 C-level executives and directors conducted by Accenture finds 90 percent of executives believe data is...
Software Bill of Materials (SBOMs) are becoming a cybersecurity staple
While the Software Bill of Materials (SBOM) has been a part of the cybersecurity vocabulary for some time, its importance has grown, especially in terms of its significance as part of routine cybersecurity workflows. CISA has thrown its weight behind...
Managed Kubernetes expertise is needed now more than ever
As organizations embrace cloud-native applications running on platforms such as Kubernetes, it’s become apparent that internal IT teams are running into a range of management challenges. A survey of 500 platform teams working in organizations with more than 1,000 employees...
MSPs must become healthcare providers’ first line of defense
The threat to cybersecurity in the healthcare sector has grown so acute, that the United States Senate held hearings in mid-March to discuss what can be done to mitigate the growing menace.
Cybersecurity Threat Advisory: 3CX supply chain attack updates
This is a follow-up to the 3CX supply chain attack threat advisory. A malware was found in the 3CX VoIP Desktop Application, which has been delivered to users through legitimate 3CX updates. 3CX has since released security updates, and below...
Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp
A recent compromise has caused trojanized versions of the 3CXDesktopApp executable to be distributed on 3CX’s website as well as pushed through updates. The malicious version of the 3CX application is used to sideload malicious .DLL files. These .DLL files...
Repeat ransomware attacks: What’s putting victims at risk?
Despite growing awareness of the risk and impact of ransomware, more effective security measures, and international collaborations to bring down attack groups and disrupt their criminal operations, ransomware remains an enduring and evolving cyberthreat. Every organization is a potential target.