Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerability within TP-Link routers

Cybersecurity Threat Advisory: Vulnerability within TP-Link routers

A vulnerability that could lead to critical status, tracked as CVE-2023-1389, was identified in TP-Link Archer AX-21 routers. The Ballista botnet is currently exploiting this vulnerability, which can spread automatically across the web. Continue reading this Cybersecurity Threat Advisory to...

/ March 12, 2025
cyber risks
Proactive strategies for MSPs to tackle cross-border cyber risks

Proactive strategies for MSPs to tackle cross-border cyber risks

Cyber risks that begin in one place tend to spread worldwide. This means managed service providers (MSPs) must look beyond their clients’ cubicles to see what is going on in other parts of the world so they are not caught...

/ March 11, 2025
Medusa ransomware and its cybercrime ecosystem

Medusa ransomware and its cybercrime ecosystem

Greek mythology says the Medusa was once a beautiful woman until Athena’s curse transformed her into a winged creature with a head full of snakes. Because of her power to petrify anyone who looked directly upon her face, she is...

/ March 10, 2025
The rise of AI PCs: A new endpoint MSPs will soon encounter

The rise of AI PCs: A new endpoint MSPs will soon encounter

Managed service providers (MSPs) in the age of artificial intelligence (AI) will soon see a different type of endpoint, known as AI PCs, on the networks they manage. AI PCs simplify the process of building AI models and running inference...

/ March 6, 2025 / 6 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical VMware vulnerabilities exploited

Cybersecurity Threat Advisory: Critical VMware vulnerabilities exploited

Three critical vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) are actively exploited, posing a significant threat to VMware virtualization environments. Review the details in this Cybersecurity Threat Advisory to learn how to mitigate your risks. What is the threat? These vulnerabilities present...

/ March 5, 2025
cybercrime economy
“Script Kiddies” get hacked—what it means about the cybercrime economy

“Script Kiddies” get hacked—what it means about the cybercrime economy

The discovery of a Trojan disguised as software to help low-skill hackers build XWorm RAT malware indicates the maturity and complexity of the thriving cybercrime economy—and it reminds us that there’s no honor among thieves. Imagine that you are an ambitious...

/ March 5, 2025
AI risks
AI’s Double-Edged Sword: Harnessing power while mitigating risks

AI’s Double-Edged Sword: Harnessing power while mitigating risks

Artificial intelligence (AI) is everywhere. Companies of all sizes and in every market, including MSSPs, are deploying or experimenting with how the technology can improve everything from call center operations to threat intelligence to marketing to quality control on the...

/ March 3, 2025 / 7 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in PostgreSQL

Cybersecurity Threat Advisory: Critical vulnerability in PostgreSQL

Security experts identified a critical PostgreSQL vulnerability, CVE-2025-1094, with a CVSS of 8.1. The vulnerability poses a significant risk to database integrity in enterprise and production environments. Review this Cybersecurity Threat Advisory to learn how to mitigate your risks. What...

/ February 28, 2025
MSPs
An MSP opportunity: Navigating growing connectivity in healthcare

An MSP opportunity: Navigating growing connectivity in healthcare

The healthcare vertical appeals to managed service providers (MSPs) as connectivity within this already connected industry continues to grow. According to Precedence Research, the global IoT medical devices market was valued at $106 billion USD in 2025 and is projected to...

/ February 25, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation

A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919.  Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

/ February 25, 2025