Results for: ransomware

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption
When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

KeRanger brings ransomware to the Mac
Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

Cybersecurity Threat Advisory: Critical VMware vulnerabilities exploited
Three critical vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) are actively exploited, posing a significant threat to VMware virtualization environments. Review the details in this Cybersecurity Threat Advisory to learn how to mitigate your risks. What is the threat? These vulnerabilities present...

“Script Kiddies” get hacked—what it means about the cybercrime economy
The discovery of a Trojan disguised as software to help low-skill hackers build XWorm RAT malware indicates the maturity and complexity of the thriving cybercrime economy—and it reminds us that there’s no honor among thieves. Imagine that you are an ambitious...

Cybersecurity Threat Advisory: Check Point’s flaw under active exploitation
A threat cluster dubbed “Green Nailao” is targeting European organizations, particularly in the healthcare sector, using Check Point Network Gateway Security vulnerability, CVE-2024-24919. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat?...

Proven strategies for MSPs selling cybersecurity
Small and medium-sized enterprises (SMEs) are just as vulnerable to cyberattacks as a Fortune 500 company. According to the U.S. Chamber, a majority (60 percent) of small businesses say cybersecurity threats, including phishing, malware, and ransomware, are a top concern....

2024 by the numbers
The threat landscape is always churning, with new threats emerging while others disappear or fade to irrelevance. Consider ALPHV, a ransomware-as-a-service (RaaS) group that provided the infrastructure, tools, and administrative services to the individual hacker who ransomed $22 million from Change Healthcare...

Experts look ahead part 2: Cybersecurity in 2025
Last week, we consulted several cybersecurity experts to gain insights into potential threats that may emerge in 2025. Given the variety of opinions and expertise available, we decided to reach out again this week and compiled an equally diverse and...

Experts look ahead part 1: Cybersecurity in 2025
With the new year here, we thought we’d check with various experts to see if they could peer into their crystal balls and predict what 2025 might bring to the world of cybersecurity. Their insights and predictions paint a picture...

Top highlights of 2024 on SmarterMSP.com
2024 has been a busy year for SmarterMSP.com. Our team has curated content to help managed service providers (MSPs) enhance their business, sales, and marketing strategies, stay ahead of emerging trends and cyber threats, and, most importantly, prioritize customers. As...