Category: Security

Cybersecurity Threat Advisory: EvilExtractor malware surge detected
EvilExtractor malware has spiked in Europe and the US. EvilExtractor is distributed through phishing campaigns and can harvest various types of data, including browser history, passwords, and cryptocurrency wallets. This is a concern because of the malware’s ability to evade...

Steps to prevent automotive hacking threats for MSPs
Many businesses now have company-owned vehicles, especially ones that didn’t originally have a need for them. As medicine, education, and banking have spread beyond the boundaries of corporate cubicles, more and more enterprises find themselves owning and maintaining vehicles. That’s...

The opportunity for managed security services is now
It doesn’t appear that cybersecurity is exempt from a wave of cutbacks that have been made by organizations around the globe, but if there is one bright spot from a managed services perspective, it is that more organizations are relying...

Cybersecurity Threat Advisory: New QBot malware delivering campaigns discovered
A new QBot malware campaign has been discovered. Using hijacked business emails, bad actors are distributing PDF and WSF file formats in reply-chain phishing emails to distribute malware. The campaign is designed to steal sensitive data from the target system,...

Beware! USB drop attacks persist
MSPs have a pile of challenges when it comes to defending clients from cyber threats, but sometimes little can be done when physical and human elements are involved. One of the oldest “tricks” in the hackers’ arsenal is the “USB...

MSPs can fill the data management skills gap created by AI
With the rise of artificial intelligence, an appreciation of the business value of data is now finally starting to increase. A global survey of 4,777 C-level executives and directors conducted by Accenture finds 90 percent of executives believe data is...

Software Bill of Materials (SBOMs) are becoming a cybersecurity staple
While the Software Bill of Materials (SBOM) has been a part of the cybersecurity vocabulary for some time, its importance has grown, especially in terms of its significance as part of routine cybersecurity workflows. CISA has thrown its weight behind...

Managed Kubernetes expertise is needed now more than ever
As organizations embrace cloud-native applications running on platforms such as Kubernetes, it’s become apparent that internal IT teams are running into a range of management challenges. A survey of 500 platform teams working in organizations with more than 1,000 employees...

MSPs must become healthcare providers’ first line of defense
The threat to cybersecurity in the healthcare sector has grown so acute, that the United States Senate held hearings in mid-March to discuss what can be done to mitigate the growing menace.
Cybersecurity Threat Advisory: 3CX supply chain attack updates
This is a follow-up to the 3CX supply chain attack threat advisory. A malware was found in the 3CX VoIP Desktop Application, which has been delivered to users through legitimate 3CX updates. 3CX has since released security updates, and below...