Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

A critical zero-click remote code execution (RCE) vulnerability, identified as CVE-2024-30103, was recently discovered in Microsoft Outlook. This flaw allows malicious actors to execute arbitrary code on a victim’s system simply by opening a specially crafted email. Review the details...

/ August 15, 2024
Email security
Understanding email threats: The foundation of email security

Understanding email threats: The foundation of email security

In today’s digital landscape, email remains a fundamental communication tool for businesses. However, its ubiquity makes it a prime target for cyber threats. Understanding these threats is the first step in fortifying your email security. In this blog post, we’ll...

/ August 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Smart Install vulnerability

Cybersecurity Threat Advisory: Cisco Smart Install vulnerability

There has been a surge in malicious cyber activities exploiting the Cisco Smart Install (SMI) legacy feature. This legacy feature if enabled by default on many Cisco devices, allowing threat actors to gain unauthorized access to network devices, allowing them...

/ August 13, 2024
Barracuda RMM
Barracuda RMM named CRN Annual Report Card MSP RMM overall winner

Barracuda RMM named CRN Annual Report Card MSP RMM overall winner

We are excited to share that Barracuda Networks’ remote monitoring and management (RMM) platform has been named the top Managed Services – MSP RMM Platform in this year’s CRN Annual Report Card (ARC), with an overall score of 82.7.  The...

/ August 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Windows SAC and SmartScreen design flaws

Cybersecurity Threat Advisory: Windows SAC and SmartScreen design flaws

A design flaw within Windows Smart App Control (SAC) and SmartScreen has allowed attackers to launch programs without triggering a security warning. Review this Cybersecurity Threat Advisory to find out how to prevent attackers from exploiting this flaw and keep...

/ August 7, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical zero-day vulnerability in Apache OFBiz

Cybersecurity Threat Advisory: Critical zero-day vulnerability in Apache OFBiz

CVE-2024-38856 is a new Apache OFBiz ERP system critical zero-day vulnerability. If you are using this system, please continue reading this Cybersecurity Threat Advisory to learn which steps you should take to mitigate your risk. What is the threat? Researchers...

/ August 7, 2024
Predictions for the future of AI in cybersecurity

Predictions for the future of AI in cybersecurity

Threat actors are improving their attacks by leveraging artificial intelligence (AI) in every way. AI makes every attack from deepfakes to credential stuffing cheaper, better, and faster. The good news is that the security industry also has access to AI capabilities, and AI-enhanced...

/ August 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware ESXi flaw exploited by ransomware group

Cybersecurity Threat Advisory: VMware ESXi flaw exploited by ransomware group

A VMware ESXi vulnerability, known as CVE-2024-37085, has been discovered and it is actively exploited by several ransomware groups. Review this Cybersecurity Threat Advisory to learn how to limit the impact of this flaw. What is the threat? CVE-2024-37085 is an...

/ August 1, 2024
Threat Spotlight: How company size affects the email threats targeting your business

Threat Spotlight: How company size affects the email threats targeting your business

It takes less than a minute for someone to fall for a phishing scam. According to the 2024 Data Breach Investigations Report, the median time for a recipient to click on a malicious link after opening the email is 21 seconds, followed by...

/ July 30, 2024
10 Essential steps to transition from VPN to Zero Trust Access

10 Essential steps to transition from VPN to Zero Trust Access

In today’s evolving digital landscape, remote work has become the norm, and cyber threats are growing more sophisticated. Traditional VPN solutions are struggling to keep pace with these changes, prompting IT leaders to consider adopting a more robust and adaptive...

/ July 29, 2024