Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Microsoft Word vulnerability

Cybersecurity Threat Advisory: New Microsoft Word vulnerability

A new Microsoft Word vulnerability, CVE-2023-36761, was disclosed by Microsoft. This new vulnerability is rated 5.3 by NIST, a medium-level vulnerability but Microsoft has rated this as “Important”. Barracuda MSP recommends reviewing this Cybersecurity Threat Advisory in detail and follow...

/ September 28, 2023
security
From Basics to Breakthroughs: Evolution of IT security in the 1980s

From Basics to Breakthroughs: Evolution of IT security in the 1980s

As part of our 5-part series on the evolution of cybersecurity, check out our first article below that covers how War Games and Worms led to the creation of the first cybersecurity efforts in the 1980s. While cybersecurity is a multibillion-dollar...

/ September 28, 2023
SMBs must prioritize cybersecurity planning

SMBs must prioritize cybersecurity planning

Cybersecurity vulnerabilities connected to large businesses have received much attention recently, especially the several casinos in Las Vegas that were forced to go offline due to cyberattacks. Casinos are a vital economic engine in Nevada, but it’s not just sprawling...

/ September 27, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities

Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities

Apple has released more security patches after three zero-day vulnerabilities were discovered in iOS, iPadOS, MacOS, WatchOS, and Safari. These vulnerabilities are actively being exploited in the wild against several frameworks and systems of Apple products, making sixteen total zero-days...

/ September 26, 2023
Current IT monitoring approaches lead to MSP opportunity

Current IT monitoring approaches lead to MSP opportunity

As environments become more complex, the level of satisfaction with existing approaches to IT monitoring is declining. A survey of 500 IT leaders conducted by Method Research on behalf of LogicMonitor finds nearly half of respondents (46 percent) have negative...

/ September 25, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Threat actor targets government

Cybersecurity Threat Advisory: Threat actor targets government

This Cybersecurity Threat advisory discusses a Chinese threat actor known as “Earth Lusca” has been observed targeting government entities. They are using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing...

/ September 25, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical security patches for GitLab

Cybersecurity Threat Advisory: Critical security patches for GitLab

This Cybersecurity Threat Advisory highlights GitLab’s recent critical vulnerability, which security update have been released for. A successful exploitation can allow threat actors to mask themselves as other users during scheduled security scans while they run automated tasks (also known...

/ September 22, 2023
Webinar: “Uplevel Your MSP Business” with Barracuda MSP

Webinar: “Uplevel Your MSP Business” with Barracuda MSP

The turbulent cyberthreat landscape has many MSPs rethinking their strategies when it comes to cybersecurity. And in turn, this affects how they uplevel their MSP businesses. So, what can you do? Well, smart MSPs, such as MJ Flood, look for...

/ September 21, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered

Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered

Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to...

/ September 21, 2023
Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

/ September 20, 2023