Category: Security
Cybersecurity Threat Advisory: Socks5Systemz botnet compromise
The Socks5Systemz botnet has been revealed as the backbone for the illicit proxy service PROXY.AM, compromising over 85,000 devices globally. This botnet enables cybercriminals to conduct anonymous operations, including fraud, data theft, and distributed denial-of-service (DDoS) attacks. Continue to read...
Cybersecurity Threat Advisory: Cleo file transfer critical vulnerability
A critical vulnerability, identified as CVE-2024-50623, has been discovered in Cleo’s file transfer software suite. This vulnerability allows attackers to exploit an unrestricted file upload and download flaw, potentially leading to remote code execution (RCE) on vulnerable systems. Continue reading...
’Tis the season to avoid holiday email scams
Beware of common holiday email scams. As the holidays approach, businesses are busier than ever, and cybercriminals know it. Along with cheer, joy, and giving, the holidays also bring an unfortunate surge in cyber scams. As businesses tackle everything from...
Cybersecurity Threat Advisory: New VPN client vulnerabilities to watch out for
Vulnerabilities were discovered in SonicWall NetExtender, CVE-2024-29014, and Palo Alto GlobalConnect, CVE-2024-5921, which can lead to remote code execution (RCE). Continue reading this Cybersecurity Threat Advisory to limit your exposure to these vulnerabilities. What is the threat? The vulnerabilities exhibit...
Cybersecurity Threat Advisory: Active exploitation of ASA vulnerability
Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. Review this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...
7 cybersecurity trends highlighting the case for managed XDR
As the digital threat landscape becomes increasingly sophisticated, managed service providers (MSPs) face mounting pressure to adapt their cybersecurity offerings. One of the most effective solutions available today is managed extended detection and response (XDR). This approach integrates multiple layers...
Threat Spotlight: Phishing techniques to look out for in 2025
Over the last few months, Barracuda’s threat analysts have reported on several advanced phishing techniques implemented by attackers to evade security controls and make malicious emails look more convincing, legitimate, and personal. In this blog post, we look at how these and...
Securing clients’ fleets: Unlocking new opportunities for MSPs
The market for cybersecurity services as it pertains to autonomous and non-autonomous vehicles is growing. According to Allied Market Research, the estimated industry size of cybersecurity for the autonomous vehicles market was valued at $356.0 million in 2023 and is...