Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Kaseya VSA Ransomware Update

Cybersecurity Threat Advisory: Kaseya VSA Ransomware Update

NOTE TO CLARIFY ON AN EARLIER COMMUNICATION: SKOUT Cybersecurity’s product offerings do not use Kaseya in any means and are not impacted by this incident. If you have any questions, please contact the Security Operations Center. Threat Update Kaseya has...

/ July 3, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Kaseya VSA Supply Chain Exploit Distributing Ransomware

Cybersecurity Threat Advisory: Kaseya VSA Supply Chain Exploit Distributing Ransomware

Threat Update On July 2nd, 2021, Kaseya’s Remote Monitoring and Management Platform “Kaseya VSA” was exploited with signs of a sophisticated Supply Chain attack. Kaseya VSA is now actively being used by threat actors to distribute ransomware. Kaseya has taken...

/ July 2, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Buffer Overflow Leads to Partial Memory Leak

Cybersecurity Threat Advisory: Buffer Overflow Leads to Partial Memory Leak

Threat Update On June 23, security researchers reported that SonicWall’s stack-based Buffer Overflow vulnerability from late last year was only partially patched, yielding another attack vector for unpatched systems. A threat actor can send malicious requests to the firewall to...

/ July 2, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Wormable Ransomware Targeting Linux and Docker instances

Cybersecurity Threat Advisory: Wormable Ransomware Targeting Linux and Docker instances

Threat Update A new ransomware built in Bash has been discovered targeting Linux and Docker cloud containers. This malware is built in Bash and has been given the name “DarkRadiation”. There is no currently known information about the delivery methods...

/ June 30, 2021
USB flash drives and their cybersecurity dangers

USB flash drives and their cybersecurity dangers

As cloud storage has grown in popularity, the use of USB flash drives has declined in many settings. The decline in popularity of USB flash drives, however, hasn’t necessarily diminished their threat, as they are still a common tool in some...

/ June 30, 2021 / 2 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical XXE Vulnerability Discovered in ConnectWise Automate

Cybersecurity Threat Advisory: Critical XXE Vulnerability Discovered in ConnectWise Automate

Threat Update This month, it was discovered that ConnectWise Automate versions 2021.6.131 and prior are vulnerable to exploits that allow threat actors to remotely execute code and access confidential data by performing XML external entity (XXE) injection attacks. The severity...

/ June 29, 2021
Ask an MSP Expert: Why should we replace our VPN with ZTNA?

Ask an MSP Expert: Why should we replace our VPN with ZTNA?

Q: With the sudden mass shift to remote working in response to the pandemic, my MSP business set up VPN configurations for each of our clients to meet their connectivity needs. What advantages does ZTNA offer that make it worth...

/ June 28, 2021
Tech Time Warp
Tech Time Warp: The Pikachu virus is not your friend

Tech Time Warp: The Pikachu virus is not your friend

It sounds so innocent: An email appears in your inbox, subject line “Pikachu Pokemon.” The message speaks of friendship and invites you to visit Pikachu on his website. And the attachment (warning bells going off yet?) features an animation of...

/ June 25, 2021
Organizations need MSPs to become cloud security heroes

Organizations need MSPs to become cloud security heroes

When not done right, cloud security can become a bit of a mess. Misconfigurations of cloud services are more widespread than ever at a time when cybercriminals have tools that enable them to discover vulnerabilities in a matter of minutes....

/ June 24, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Botnets Version Hunting Perimeter Devices

Cybersecurity Threat Advisory: Botnets Version Hunting Perimeter Devices

Threat Update Threat actors have been seen in the wild scanning for perimeter devices which are running vulnerable firmware and have not been updated to allow for vulnerabilities to be patched. Perimeter devices (such as firewalls, intrusion detection/prevention systems, and...

/ June 24, 2021