Results for: ransomware

Accelerating cybersecurity Time to Resolution (TTR)

Accelerating cybersecurity Time to Resolution (TTR)

When it comes to cyberattacks and data breaches, time to respond (TTR) is a critical metric for managed service providers (MSPs), but one that can be challenging as the frequency and sophistication of threats continue to evolve. MSPs typically have...

/ September 25, 2024
scalable backup
The benefits of Barracuda’s new scalable backup

The benefits of Barracuda’s new scalable backup

Data is money, and data protection is a key piece of any business continuity plan or cybersecurity strategy. This is a concern for companies that need an increasing amount of storage and backup capacity but have no extra budget to...

/ September 18, 2024
navigate MSP
Insights for navigating potential MSP adversities

Insights for navigating potential MSP adversities

Managed service providers (MSPs) must navigate an increasingly complex cyber world. From dealing with the Internet of Things (IoT), 5G, and ransomware, to managing hardware, education, and training. The intricacies of running a business, both theirs and their clients, can...

/ September 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup security flaws

Cybersecurity Threat Advisory: Veeam Backup security flaws

There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...

/ September 10, 2024
cyber risk
Summer Roundup: Cyber risks for MSPs to monitor

Summer Roundup: Cyber risks for MSPs to monitor

As summer begins its swan song and thoughts begin to turn toward autumn, the Cybersecurity and Infrastructure Security Agency (CISA) has a fresh batch of advisories. Released in August, these advisories highlight the various cyber risks lurking out there, many...

/ September 10, 2024
Tech Time Warp
Tech Time Warp: Back to school and back to hacks

Tech Time Warp: Back to school and back to hacks

Now that we are past Labor Day, school is back in session across the United States—which means summer vacation is over for cybercriminals, too. Let’s dive into this week’s edition of Tech Time Warp. The education sector is increasingly a...

/ September 6, 2024
data migration
Data migration expertise: A must-have for MSPs

Data migration expertise: A must-have for MSPs

Managed service providers (MSPs) that have data migration expertise are finding their services are in more demand than ever. A survey of 300 application and software development, IT, and security leaders conducted on behalf of Onymos, found that more than...

/ September 3, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...

/ August 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: EDRKillShifter, a growing threat

Cybersecurity Threat Advisory: EDRKillShifter, a growing threat

A cybercrime group associated with the RansomHub ransomware has been observed using a newly developed tool named “EDRKillShifter” to disable endpoint detection and response (EDR) software on compromised systems. This tool is the latest in a growing list of EDR-killing...

/ August 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability

Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability

Another critical zero-click Windows vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack, affecting all systems with IPv6 enabled. Review this Cybersecurity Threat Advisory now to mitigate potential exploitation and protect your systems. What is the threat?...

/ August 16, 2024