Results for: ransomware
Municipal cybersecurity: MSPs navigate the front lines of digital defense
American cities are under siege in cyberspace, and the managed service providers (MSPs) they depend on are their best hope for defense. Last week, St. Paul, Minnesota, declared a state of emergency after a “deliberate, coordinated digital attack” forced the...
Cybersecurity Threat Advisory: SonicWall SMA arbitrary file upload vulnerability
Attackers are actively exploiting CVE-2025-40599, a critical vulnerability in SonicWall’s Secure Mobile Access (SMA) devices, to upload arbitrary files and gain unauthorized access. This flaw enables them to execute malicious code and compromise affected systems. The Akira ransomware group is...
Cybersecurity Threat Advisory: Critical PaperCut NG/MF CSRF flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-2533, a critical PaperCut NG/MF print management software vulnerability, to its Known Exploited Vulnerabilities (KEV) catalog. Attackers are actively exploiting this cross-site request forgery (CSRF) flaw in the wild. Review...
The quantum horizon: Why MSPs must start preparing now
Remember all the major disruptions over the years? The advent of client/server computing, thin clients, virtualization, everything-as-a-service, and most recently artificial intelligence (AI). Now, the early whispers of quantum computing has surfaced. These are just some of the many new...
Cybersecurity Threat Advisory: Microsoft SharePoint zero-day vulnerability
Attackers are actively exploiting CVE-2025-53770, a critical zero-day vulnerability in Microsoft SharePoint, to execute remote code without authentication. This flaw allows attackers to deploy persistent malware and potentially exfiltrate sensitive data from unpatched on-premises environments. Review the full details in...
Vacation season is open season for cybercriminals: Here’s why
For school children, summer means lazy days of swimming pools, splash pads, melting ice cream cones, and camp. For cybersecurity professionals, it means being on guard 24/7, because cybercriminals don’t take a summer break. The summertime impact Cyberattacks now occur...
Cybersecurity Threat Advisory: FileFix attack weaponizes Windows File Explorer
Security researchers have uncovered a new attack method known as “FileFix,” which exploits Windows File Explorer to execute stealthy PowerShell commands. By abusing legitimate Windows functionality, attackers can run malicious code while evading traditional security controls. Read this Cybersecurity Threat...
Navigating endpoint security: The role of MSPs
According to Verizon’s 2025 Data Breach Investigations Report, more than two-thirds of breaches involve endpoints. Some eye-catching endpoint security statistics include: About 88 percent of breaches reported involving endpoints involved the use of stolen credentials. Thirty percent of compromised systems...
