Category: Security
Start the year strong: 10 essential questions every IT team should address
It’s a new year (and also a day ending in Y), which means it’s an excellent time for you to review your security posture. Use your renewed energy to seriously analyze your vulnerabilities, detection methods and organizational procedures. Answer these...
Cybersecurity Threat Advisory: TamperedChef—Malicious PDF editing application
TamperedChef is an information‑stealing malware distributed through a trojanized PDF editing tool called AppSuite PDF Editor. The application is promoted using malicious websites and Google Ads, enticing users to download what appears to be a legitimate installer. Review this Cybersecurity...
Cybersecurity Threat Advisory: Critical SolarWinds Web Help Desk flaws
SolarWinds has released security updates addressing multiple vulnerabilities in its Web Help Desk (WHD) product, including four critical flaws—CVE‑2025‑40551, CVE‑2025‑40552, CVE‑2025‑40553, and CVE‑2025‑40554—that enable authentication bypass and remote code execution (RCE). These issues allow attackers to gain unauthorized access and...
Cybersecurity Threat Advisory: Malicious VS Code extension impersonating Clawdbot
Security researchers discovered a malicious Visual Studio Code (VS Code) extension named “ClawdBot Agent” impersonating the trending AI assistant Clawdbot. Although it offers functional AI coding features, the extension secretly deploys a weaponized remote access tool on Windows systems immediately...
Survey: Kubernetes growth unlocks new MSP opportunities
A global survey of 628 IT professionals shows that internal IT teams are increasingly struggling to manage cloud‑native applications running on Kubernetes clusters—creating new opportunities for managed service providers (MSPs). Steady Kubernetes adoption puts pressure on IT teams Conducted by...
Cybersecurity Threat Advisory: Zero-day Cisco vulnerability
CVE‑2026‑20045 is a critical zero‑day vulnerability impacting multiple Cisco Unified Communications products and Webex Calling Dedicated Instances. Successful exploitation allows an unauthenticated attacker to achieve remote code execution. Continue reviewing this Cybersecurity Threat Advisory to learn how to mitigate your...
MFA fatigue continues to be a threat in 2026
MFA fatigue attacks are rising—and succeeding—because users are overwhelmed. Logging in no longer means simply entering a password. It often requires a code sent to a device, scanning a prompt, or approving an authentication request. According to recent Microsoft data,...
Cybersecurity Threat Advisory: Critical VMware vCenter Server vulnerability
CISA has added a critical VMware vCenter Server vulnerability to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The flaw is tracked as CVE‑2024‑37079 with a CVSS score of 9.8. It was originally patched in June 2024...
Cybersecurity Threat Advisory: Critical FortiCloud bypass remains unpatched
Fortinet has confirmed that critical authentication bypass vulnerabilities affecting FortiCloud Single Sign-On (SSO) remain exploitable, even in environments that have already applied recent patches. Attackers are actively abusing these flaws, and Fortinet expects to issue additional fixes within the next...
