Category: Security

Staying ahead of social engineering attacks

Staying ahead of social engineering attacks

According to Verizon’s 2018 Data Breach Investigations Report, social engineering represents 93 percent of email breaches. While social engineering and spear phishing attacks have malicious intent to get something from the user, they are built differently from other attacks. They...

/ March 5, 2020
Cybersecurity at home: The growing residential MSP market

Cybersecurity at home: The growing residential MSP market

MSPs have been dipping their big toe in the residential managed services water for years. However, the convergence of value, customer convenience, and margins still hasn’t happened on a large scale. The global managed services market size is expected to...

/ March 5, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Coronavirus Related Phishing Campaigns

Cybersecurity Threat Advisory: Coronavirus Related Phishing Campaigns

Advisory Overview There has been a rise in phishing campaigns related to Coronavirus. The campaigns vary in exact messaging, but many have imitated the World Health Organization or HR departments issuing warnings and work-from-home guidelines. SKOUT advises taking extra precaution...

/ March 4, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Remote Code Execution on Microsoft Exchange Server

Cybersecurity Threat Advisory: Remote Code Execution on Microsoft Exchange Server

Advisory Overview All unpatched versions of Microsoft Exchange Server are vulnerable to a remote code execution bug. The attack requires successful authentication to an Exchange Server. Attackers are scanning the internet for unpatched servers and attempting to authenticate with leaked...

/ March 2, 2020
AI could help make your clients more secure

AI could help make your clients more secure

There are so many security threats coming at us from all sides. It’s beyond our ability to keep up without the help of technology. Today, that means using artificial intelligence to help understand and scan for issues. As technology continues...

/ March 2, 2020
Coronavirus helps spread computer viruses

Coronavirus helps spread computer viruses

Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...

/ February 27, 2020 / 13 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices

Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices

Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...

/ February 21, 2020
Tech Time Warp: Mocmex sneaks in via digital photo frame

Tech Time Warp: Mocmex sneaks in via digital photo frame

“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...

/ February 21, 2020
AI-based security helps MSP alleviate email security pain

AI-based security helps MSP alleviate email security pain

Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...

/ February 20, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)

Cybersecurity Threat Advisory: Jenkins UDP DDoS Attack (CVE 2020-2100)

Advisory Overview Jenkins is an open source automation server used to build, test and deploy software projects. Attackers are rendering two services that are enabled by default in Jenkins (UDP multicast/broadcast and DNS multicast) unusable with Distributed Denial of Service...

/ February 19, 2020