Category: Security
New chip flaws could create more headaches for MSPs
We saw two chip flaws emerge last week affecting both Intel and AMD. The problem with these particular flaws is that they are built into the chip architecture, which makes them challenging to patch. This isn’t the first time we’ve...
Tech Time Warp: MyLife virus tempts users with screensavers
Sometimes a computer user gets tired of flying toasters. That was the gamble taken by the creators of MyLife, a worm with multiple variants infecting PCs in March and April 2002.
Cybersecurity Threat Advisory: ZyXEL NAS RCE Vulnerability (CVE-2020-9054)
Advisory Overview Several ZyXEL NAS devices are vulnerable to Remote Code Execution (RCE). The vulnerability could potentially allow an attacker to execute remote commands as root. A patch has been released, but many devices are at an end of life...
Staying ahead of social engineering attacks
According to Verizon’s 2018 Data Breach Investigations Report, social engineering represents 93 percent of email breaches. While social engineering and spear phishing attacks have malicious intent to get something from the user, they are built differently from other attacks. They...
Cybersecurity at home: The growing residential MSP market
MSPs have been dipping their big toe in the residential managed services water for years. However, the convergence of value, customer convenience, and margins still hasn’t happened on a large scale. The global managed services market size is expected to...
Cybersecurity Threat Advisory: Coronavirus Related Phishing Campaigns
Advisory Overview There has been a rise in phishing campaigns related to Coronavirus. The campaigns vary in exact messaging, but many have imitated the World Health Organization or HR departments issuing warnings and work-from-home guidelines. SKOUT advises taking extra precaution...
Cybersecurity Threat Advisory: Remote Code Execution on Microsoft Exchange Server
Advisory Overview All unpatched versions of Microsoft Exchange Server are vulnerable to a remote code execution bug. The attack requires successful authentication to an Exchange Server. Attackers are scanning the internet for unpatched servers and attempting to authenticate with leaked...
AI could help make your clients more secure
There are so many security threats coming at us from all sides. It’s beyond our ability to keep up without the help of technology. Today, that means using artificial intelligence to help understand and scan for issues. As technology continues...
Coronavirus helps spread computer viruses
Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices
Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...