Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: LayerSlider SQL injection vulnerability

Cybersecurity Threat Advisory: LayerSlider SQL injection vulnerability

An unauthenticated Structured Query Language (SQL) injection vulnerability, known as CVE-2024-2879, has been found in the WordPress plugin LayerSlider. Review this Cybersecurity Threat Advisory to learn how to safeguard your accounts from unauthenticated attackers. What is the threat? The vulnerability...

/ April 16, 2024
Analyzing the latest Ivanti-linked CISA breach

Analyzing the latest Ivanti-linked CISA breach

Another day passes, another cyberattack strikes. This time, a recent incident impacted a major U.S. government entity known as the Cybersecurity and Infrastructure Security Agency (CISA). Back in February, CISA officials discovered that two of its internal computer systems were compromised by...

/ April 16, 2024
Four automation priorities MSPs should focus on

Four automation priorities MSPs should focus on

Many organizations conduct surveys every year about the evolving threats and cybersecurity concerns that enterprises are faced with. Info-Tech Research Group’s report is a must-read for all security stakeholders, chief information security officers (CISOs), and managed service providers (MSPs). Some...

/ April 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in Palo Alto PAN-OS

Cybersecurity Threat Advisory: Critical vulnerability in Palo Alto PAN-OS

Palo Alto Networks has disclosed a critical vulnerability, CVE-2024-3400, impacting its PAN-OS software’s GlobalProtect feature. This flaw enables unauthenticated attackers to execute arbitrary code with root privileges on affected firewalls. Review this Cybersecurity Threat Advisory to keep your organization secure...

/ April 15, 2024
QR code phishing: What MSPs need to know to protect their customers

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ April 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical flaws in Ivanti

Cybersecurity Threat Advisory: Critical flaws in Ivanti

Recent flaws found in Ivanti Connect Secure and Policy Secure Gateways can lead to remote code execution (RCE) attacks. Review this Cybersecurity Threat Advisory to learn additional details and recommendations to keep your organization secure. What is the threat? Ivanti...

/ April 11, 2024
Navigate the compliance maze to unlock MSP business growth

Navigate the compliance maze to unlock MSP business growth

The cybersecurity compliance landscape continues to transform significantly as regulations get tighter and enforcement gets stricter. While businesses (and to be fair, MSPs) try to keep up, the MSP opportunity to win new business with compliance expertise and strategy is...

/ April 10, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Two vulnerabilities found in D-Link NAS devices

Cybersecurity Threat Advisory: Two vulnerabilities found in D-Link NAS devices

Two vulnerabilities were found in legacy D-Link products that have reached end-of-life (EoL) status. The vulnerabilities can cause command injection and backdoor account to these devices. This Cybersecurity Threat Advisory discusses the impact of the threat, as well as recommendations...

/ April 10, 2024
Top cybersecurity misconfigurations MSPs should address

Top cybersecurity misconfigurations MSPs should address

As we embrace spring, the fall seems to be nothing but a memory. While 2024 holds new trends, threats, and opportunities for MSPs, there are still a few things to keep in mind from 2023. In October of last year,...

/ April 9, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024