Results for: ransomware

World Backup Day: A timely reminder for MSPs to lead with resilience

World Backup Day: A timely reminder for MSPs to lead with resilience

It’s World Backup Day! This is a global reminder that data loss is far more common—and more damaging—than many organizations realize. In fact, 21 percent of people have never backed up their data, while 29 percent of data loss incidents...

/ March 31, 2026 / 3 Comments
Making the case for a layered email security approach

Making the case for a layered email security approach

MSPs have a lot of ground to cover with their clients. In addition to providing protection, there’s also persuasion. Many MSPs find themselves needing to justify additional cybersecurity investments at a time when budgets are under scrutiny—and that can make...

/ March 30, 2026
How MSPs grow email lists using LinkedIn

How MSPs grow email lists using LinkedIn

Key Takeaways Treat LinkedIn as the top of a list-building strategy, not the destination. Offer practical resources MSP buyers care about to earn email opt-ins. Use a Pillar–Cluster–Dot–FAQ framework to turn one topic into ongoing LinkedIn engagement. Most IT providers...

/ March 25, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day

Cybersecurity Threat Advisory: Interlock targets Cisco Secure FMC in zero-day

Recent reporting from Amazon Threat Intelligence and multiple security researchers confirms that the Interlock ransomware group is actively exploiting a critical remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) Software. Read this Cybersecurity Threat Advisory to protect...

/ March 24, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

Cybersecurity Threat Advisory: Active exploitation of Microsoft SharePoint RCE

A critical remote code execution (RCE) vulnerability in Microsoft SharePoint caused by the deserialization of untrusted data has been discovered. Authentication is not required by attackers on unprotected systems. Review the Cybersecurity Threat Advisory now to protect you and your...

/ March 23, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Cybersecurity Threat Advisory: Critical Veeam Backup flaws

Veeam has released critical security updates for its Backup & Replication product to address seven high‑severity vulnerabilities that could allow attackers to take over backup servers and tamper with stored backups. Users can exploit these flaws if they have valid...

/ March 18, 2026
The quiet comeback of credential-based attacks

The quiet comeback of credential-based attacks

Stolen credentials have been around as long as email itself. This retro attack vector is making a comeback due to its low cost and simplicity. According to Barracuda’s 2025 Email Security Breach Report, credential compromise attacks are becoming both more...

/ March 17, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...

/ March 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...

/ March 12, 2026
That’s not our admin: The blind spots that open doors to attackers

That’s not our admin: The blind spots that open doors to attackers

Lessons from around 600,000 security alerts analyzed by Barracuda Managed XDR Takeaways In 2025, 90% of ransomware incidents exploited firewalls, and the fastest observed ransomware case took three hours from breach to encryption. The most widely detected CVE vulnerability dates...

/ March 2, 2026