Category: Security

Five healthcare cybersecurity trends to monitor in 2024

Five healthcare cybersecurity trends to monitor in 2024

We’ve looked at the cybersecurity trends in store for 2024, but trends will differ by discipline in the months ahead. For instance, industrial settings have their own set of vulnerabilities, as do finance, education, government, and healthcare. Hackers especially covet...

/ February 5, 2024
ai
A CISO’s guide to the role of AI in cybersecurity

A CISO’s guide to the role of AI in cybersecurity

Today’s digital landscape is evolving at an unprecedented pace, and the rapid emergence of generative artificial intelligence (GenAI) marks a distinct shift in how we perceive and use the capabilities of AI, especially in the realm of cybersecurity. According to...

/ February 2, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ivanti alerts of new high-severity flaws

Cybersecurity Threat Advisory: Ivanti alerts of new high-severity flaws

During Ivanti’s announcement of their fixes for the recent critical zero-day vulnerabilities, the software vendor alerts of two new high-severity flaws in its Connect Secure and Policy Secure products. One of which is said to be under targeted exploitation in...

/ February 1, 2024
security
Focus on cybersecurity to uplevel your MSP business

Focus on cybersecurity to uplevel your MSP business

What matters most to an organization? The security of the devices that its platform operates on, or the data and information that is held on and moved across that platform? If you think they are both important, think again. A...

/ February 1, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Glibc root access vulnerability

Cybersecurity Threat Advisory: Glibc root access vulnerability

A critical security flaw in the GNU C Library (glibc) has been disclosed, tracked as CVE-2023-6246. It allows malicious attackers to gain full root access on Linux machines. Read this Cybersecurity Threat Advisory to learn how to mitigate the risks...

/ February 1, 2024
evolution of cybersecurity
Evolution of cybersecurity: The rise of XDR in the 2020s

Evolution of cybersecurity: The rise of XDR in the 2020s

As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...

/ January 31, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

A massive data leak that includes information from several past breaches with a staggering 12 terabytes of data, covering at least 26 billion records, is available on the dark web. This breach involved user data from platforms such as LinkedIn,...

/ January 30, 2024
Drones: Flying security opportunities for MSPs

Drones: Flying security opportunities for MSPs

As they continue to grow in popularity, drones are increasingly being included in managed service providers’ (MSPs) hardware and software management packages. For most MSPs, this is a natural extension, as drones are becoming more widely used in commercial applications,...

/ January 25, 2024 / 1 Comment
5 security predictions for 2024 from Barracuda executives

5 security predictions for 2024 from Barracuda executives

Over the past 12 months, we’ve seen threat actors use generative AI to take threats to new levels, scaling up their attacks and making them more effective. As 2024 gets underway, we’re looking ahead to the changes, developments, and trends...

/ January 25, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: NTLM password hash leaks

Cybersecurity Threat Advisory: NTLM password hash leaks

This Cybersecurity Threat Advisory highlights a new Microsoft vulnerability that attackers are actively exploiting to steal NTLM (NT LAN Manager) hashes. Read the full article to learn the severity of the threat and recommendations to mitigate the organization’s risks. What...

/ January 24, 2024