Results for: ransomware

How attackers weaponize generative AI through data poisoning and manipulation
The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

How artificial intelligence is changing the threat landscape
the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

Data tampering is an underrated threat — get your backup ready
World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

Tip Tuesday: Educating customers on the importance of backup for World Backup Day
World Backup Day, recognized on March 31 every year, serves as a reminder for managed service providers (MSPs) to reprioritize their client’s data security. As the threat landscape continues to evolve and cyber attacks grow increasingly sophisticated, a robust and...

Cybersecurity Threat Advisory: Critical Fortinet vulnerability
A critical vulnerability is affecting many Fortinet devices. Approximately 150,000 Fortinet OS and FortiProxy Secure Web Gateway systems are believed to be exposed to this flaw. Continue reading this Cybersecurity Threat Advisory to learn how you can mitigate the potential...

Cybersecurity Threat Advisory: OpenEdge authentication bypass vulnerability
A critical vulnerability (CVE-2024-1403) affecting Progress Software OpenEdge Authentication Gateway and AdminServer impacts versions 11.7.18 and earlier, 12.2.13 and earlier, and 12.8.0. The vulnerability allows unauthorized access due to manipulation of username and password combinations during the authentication process. Review...

Cybersecurity Threat Advisory: TeamCity’s server vulnerabilities
This Cybersecurity Threat Advisory highlights JetBrains’ TeamCity vulnerabilities found in the CI/CD Server. One vulnerability allows unauthenticated access to an instance while the other allows for unauthenticated information disclosure and modification. What is the threat? A critical-severity authentication bypass vulnerability...

The role of MSPs in food supply chain cybersecurity
Food and cybersecurity seem like very different topics. When we think of our favorite potato chips or steaks to sizzle on the grill, ransomware isn’t the first thing that comes to mind. However, the food supply chain is under increasing...

A SOC’s view on 2024 cybersecurity trends
In the world of cybersecurity, threats are constantly evolving. Therefore, by throwing a spotlight on 2024 cyber trends, while considering what occurred in 2023, we can adapt our defenses and anticipate new emerging threats. Artificial intelligence (AI) will play a...