Results for: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

A critical zero-click remote code execution (RCE) vulnerability, identified as CVE-2024-30103, was recently discovered in Microsoft Outlook. This flaw allows malicious actors to execute arbitrary code on a victim’s system simply by opening a specially crafted email. Review the details...

/ August 15, 2024
Email security
Understanding email threats: The foundation of email security

Understanding email threats: The foundation of email security

In today’s digital landscape, email remains a fundamental communication tool for businesses. However, its ubiquity makes it a prime target for cyber threats. Understanding these threats is the first step in fortifying your email security. In this blog post, we’ll...

/ August 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

Cybersecurity Threat Advisory: Veeam Backup vulnerability exploit

The Veeam Backup & Replication vulnerability, CVE-2023-27532, which was patched in March 2023 is still being exploited. Attackers have managed to exploit unpatched systems to launch ransomware attacks since April 2024. Barracuda MSP recommends reviewing this Cybersecurity Threat Advisory in...

/ July 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Citrix has identified two critical vulnerabilities in its NetScaler products, including NetScaler Console, NetScaler SVM, and NetScaler Agent. These vulnerabilities can allow unauthorized access to sensitive data and lead to denial of service (DoS) attacks. Read this Cybersecurity Threat Advisory...

/ July 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

A new ransomware-as-a-service (RaaS), known as Eldorado, recently emerged, introducing locker variants for both VMware ESXi and Windows systems. Eldorado has rapidly demonstrated its ability to inflict severe damage on victims’ data, reputation, and business continuity. Review this Cybersecurity Threat...

/ July 10, 2024
Tales from the security operations center (SOC)

Tales from the security operations center (SOC)

With the frequency and variety of cyberattacks increasing daily, the need for comprehensive security measures has never been more critical. For analysts staffing a security operations center (SOC) for a global extended detection and response (XDR) service, each day brings...

/ July 4, 2024
Train employees
How MSPs can help clients build a human firewall

How MSPs can help clients build a human firewall

As cybercriminals step up their attacks, aided by AI and other technologies, it’s critical for managed service providers (MSPs) and their clients to reinforce cybersecurity awareness efforts among their employees to create a human firewall. According to the World Economic...

/ June 19, 2024
Should America’s cyber defense agency’s priorities also be yours?

Should America’s cyber defense agency’s priorities also be yours?

In February, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced its 2024 priorities for the Joint Cyber Defense Collaborative (JCDC). This group, composed of government and industry entities, was formed in 2021 and is tasked with gathering, analyzing, and sharing actionable...

/ June 11, 2024
CISA
Staying cyber safe with CISA this summer

Staying cyber safe with CISA this summer

As sure as fireflies and fireworks mean summer, so do Cybersecurity and Infrastructure Security Agency (CISA) warnings and alerts. With parents shuttling kids to day camps, pool parties, and Disney World, summer is a prime time for cybercriminals to make...

/ June 10, 2024 / 7 Comments
credential theft
5 Ways cybercriminals are using AI: Access and credential theft

5 Ways cybercriminals are using AI: Access and credential theft

Threat actors have embraced artificial intelligence (AI) for phishing, deepfakes, malware generation, content localization, and more. This week we’re looking at how they’re using it for credential theft to gain access to high-value networks. Stolen credentials are a goldmine for cybercriminals, especially if the...

/ June 4, 2024