Results for: ransomware
Accelerating cybersecurity Time to Resolution (TTR)
When it comes to cyberattacks and data breaches, time to respond (TTR) is a critical metric for managed service providers (MSPs), but one that can be challenging as the frequency and sophistication of threats continue to evolve. MSPs typically have...
Insights for navigating potential MSP adversities
Managed service providers (MSPs) must navigate an increasingly complex cyber world. From dealing with the Internet of Things (IoT), 5G, and ransomware, to managing hardware, education, and training. The intricacies of running a business, both theirs and their clients, can...
Cybersecurity Threat Advisory: Veeam Backup security flaws
There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...
Summer Roundup: Cyber risks for MSPs to monitor
As summer begins its swan song and thoughts begin to turn toward autumn, the Cybersecurity and Infrastructure Security Agency (CISA) has a fresh batch of advisories. Released in August, these advisories highlight the various cyber risks lurking out there, many...
Tech Time Warp: Back to school and back to hacks
Now that we are past Labor Day, school is back in session across the United States—which means summer vacation is over for cybercriminals, too. Let’s dive into this week’s edition of Tech Time Warp. The education sector is increasingly a...
Data migration expertise: A must-have for MSPs
Managed service providers (MSPs) that have data migration expertise are finding their services are in more demand than ever. A survey of 300 application and software development, IT, and security leaders conducted on behalf of Onymos, found that more than...
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...
Cybersecurity Threat Advisory: EDRKillShifter, a growing threat
A cybercrime group associated with the RansomHub ransomware has been observed using a newly developed tool named “EDRKillShifter” to disable endpoint detection and response (EDR) software on compromised systems. This tool is the latest in a growing list of EDR-killing...
Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability
Another critical zero-click Windows vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack, affecting all systems with IPv6 enabled. Review this Cybersecurity Threat Advisory now to mitigate potential exploitation and protect your systems. What is the threat?...