Category: Security
Tech Time Warp: Sneaky SirCam worm slithers through inboxes
When it comes to use of social engineering in malware, the SirCam worm must be among the most insidious. The worm propagated itself in the usual way via email attachment. But SirCam didn’t carry a new email attachment—the typical “invoice”...
SMBs most vulnerable to ransomware right now
For much of ransomware’s evolution, many small and medium-sized businesses (SMBs) have failed to embrace the idea that they are ransomware targets. After all, why target an SMB when Fortune 500 companies have the much deeper pockets? Seemingly, a hacker...
Prepare for the next cyberattack with a cybersecurity checklist
From the supply-chain attack at the beginning of the year, to the ransomware attack that took down a major pipeline in the United States, cyberattacks have been doing significant damage in recent times. Now, the latest supply-chain attack that some...
How Barracuda’s acquisition of SKOUT Cybersecurity helps MSPs
We have some exciting news to share! Barracuda has completed its acquisition of SKOUT Cybersecurity, a Melville, NY-based leader in cyber-as-a-service software for Managed Service Providers (MSPs) and provider of an extended detection and response (XDR) platform and service. Making SKOUT...
MSP achieves growth from selling cybersecurity solutions
Natrix Technologies got its start in 1998 as a systems integrator selling, implementing and supporting servers, switches, and routers. The company evolved into a managed services provider (MSP) in 2009 and today holds certifications with Barracuda, Microsoft, and Cisco. The...
Ransomware attacks drive increased DRaaS opportunities for MSPs
Disaster recovery (DR) is the only real defense against ransomware attacks. However, a recent survey of 150 technical and business decision makers from organizations with more than 150 employees, conducted by cloud hosting services provider iland, suggests most organizations are...
Cybersecurity Threat Advisory: Zero-Day Vulnerability in Windows Print Spooler
Threat Update Last week, security researchers accidentally published proof-of-concept (PoC) exploit code which has now been dubbed “PrintNightmare”. The vulnerability exploits a critical flaw in Microsoft’s Print Spooler service. Microsoft has issued out-of-band security updates to address the flaw and...
A look at cybersecurity halfway through 2021
We are midway through 2021, so now is an excellent time to stop and take stock in the cybersecurity landscape, both where we’ve been and where we are going. I talk to scores of cybersecurity experts each month, which has...
Cybersecurity Threat Advisory: 07-06-2021 Kaseya VSA Follow-Up Threat Advisory
Threat Update This Threat Advisory acts as a follow-up to our previously released Advisories “0048-21” and “0049-21”. Kaseya has scheduled an urgent patch for July 6, 2021, between 4:00PM EDT – 7:00PM EDT. The Kaseya VSA vulnerabilities are still un-remediated...
Remote work cybersecurity: Choosing between VPN and ZTNA
With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...