Results for: ransomware

New CISA vulnerability warning pilot program is a success
The Cybersecurity and Infrastructure Security Agency (CISA) recently announced its vulnerability warning program has issued over 2,000 alerts since its inception. The agency’s director, Jen Easterly, delivered remarks recently at the Institute for Security and Technology, sharing that these alerts...

Killware: The emerging cyberthreat
Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years. It’s now a major security issue for organizations....

Predictions from Barracuda’s security frontline to keep an eye on
Predicting the future is difficult, but you can anticipate what is likely to happen by looking at how things have evolved over time. Barracuda asked colleagues who work on the security frontline, from XDR and offensive security to international product...

Tech Time Warp: The breakthrough against software piracy that wasn’t
In this edition of Tech Time Warp we go back to April 14, 1995, when the Chinese government began widespread efforts to stop its government agencies from using pirated software. The move came after a Feb. 27, 1995, accord agreement...

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence
This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...

QR code phishing: What MSPs need to know to protect their customers
In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

How attackers weaponize generative AI through data poisoning and manipulation
The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

How artificial intelligence is changing the threat landscape
the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

Data tampering is an underrated threat — get your backup ready
World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

Tip Tuesday: Educating customers on the importance of backup for World Backup Day
World Backup Day, recognized on March 31 every year, serves as a reminder for managed service providers (MSPs) to reprioritize their client’s data security. As the threat landscape continues to evolve and cyber attacks grow increasingly sophisticated, a robust and...