Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New critical Citrix vulnerabilities

Cybersecurity Threat Advisory: New critical Citrix vulnerabilities

New critical vulnerabilities in Citrix Virtual Apps and Desktops, tracked as CVE-2024-8068 and CVE-2024-8069, as well as new flaws involving MSMQ (Microsoft Message Queuing) misconfiguration, were discovered. These vulnerabilities enable attackers to achieve unauthenticated remote code execution (RCE) on vulnerable...

/ November 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New ransomware variant to watch for

Cybersecurity Threat Advisory: New ransomware variant to watch for

A new ransomware family, Ymir, has been discovered. It is an unconventional combination of memory management functions (like malloc, memmove, and memcmp) that executes malicious code directly in the memory. Continue reading this Cybersecurity Threat Advisory to learn how to...

/ November 14, 2024
AI BEC
The rise of AI-based BEC attacks

The rise of AI-based BEC attacks

Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...

/ November 14, 2024
Zero Trust
Easily overcome Zero Trust deployment hurdles

Easily overcome Zero Trust deployment hurdles

Zero Trust Network Access (ZTNA) isn’t just a security model — it’s the future of cybersecurity. Required in many industries today, ZTNA significantly increases the security posture across the entire organization and often replaces existing VPN solutions that have been a...

/ November 13, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Phishing campaign spreading Remcos RAT malware

Cybersecurity Threat Advisory: Phishing campaign spreading Remcos RAT malware

A new phishing campaign spreading a fileless variant of Remcos RAT malware has been discovered. Read this Cybersecurity Threat Advisory to learn how this could impact your organization. What is the threat? This campaign delivers malware through a phishing email...

/ November 13, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Palo Alto PAN-OS RCE vulnerability

Cybersecurity Threat Advisory: Palo Alto PAN-OS RCE vulnerability

A threat advisory was issued to Palo Alto customers notifying them of a vulnerability in the PAN-OS interface that can lead to remote code execution (RCE). Read this Cybersecurity Threat Advisory for the best practices to securing the PAN-OS management...

/ November 13, 2024
Sextortion scams
Threat Spotlight: Evolving ‘we know where you live’ tactics personalize sextortion scams

Threat Spotlight: Evolving ‘we know where you live’ tactics personalize sextortion scams

Sextortion scams are a type of extortion where criminals attempt to extort money from victims by threatening to release explicit images or videos unless demands are met. Leveraging usernames and passwords stolen in data breaches, criminals contact victims and claim...

/ November 12, 2024
Barracuda CloudGen Firewall
Partner Spotlight: Redesigning the security mix to address evolving needs

Partner Spotlight: Redesigning the security mix to address evolving needs

M.IT Connect, a long-time managed service provider (MSP) from Hallstadt, Germany, was faced with challenges managing their previous firewall solution. Not only was it difficult to manage, but it lacked the scalability required to meet clients’ evolving needs. As their...

/ November 12, 2024 / 5 Comments
Elevate your MSP: Invest in Sales Engineer training

Elevate your MSP: Invest in Sales Engineer training

When managed service providers (MSPs) talk to clients about their security or technology needs, the clients’ employees are a vital part of any proposed solution. Deploying technology without the proper user training and education can lead to underutilization, lower customer...

/ November 7, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Okta username flaw

Cybersecurity Threat Advisory: Okta username flaw

Researchers have discovered a critical vulnerability in Okta which allows an user to authenticate to an account with a username longer than 52 characters without multi-factor authentication (MFA) enabled. Read this Cybersecurity Threat Advisory to learn how this may impact...

/ November 7, 2024