Results for: ransomware

CISA vulnerability warning program
New CISA vulnerability warning pilot program is a success

New CISA vulnerability warning pilot program is a success

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced its vulnerability warning program has issued over 2,000 alerts since its inception. The agency’s director, Jen Easterly, delivered remarks recently at the Institute for Security and Technology, sharing that these alerts...

/ April 30, 2024
Killware: The emerging cyberthreat

Killware: The emerging cyberthreat

Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years. It’s now a major security issue for organizations....

/ April 26, 2024
Predictions from Barracuda’s security frontline to keep an eye on

Predictions from Barracuda’s security frontline to keep an eye on

Predicting the future is difficult, but you can anticipate what is likely to happen by looking at how things have evolved over time. Barracuda asked colleagues who work on the security frontline, from XDR and offensive security to international product...

/ April 23, 2024
Tech Time Warp
Tech Time Warp: The breakthrough against software piracy that wasn’t

Tech Time Warp: The breakthrough against software piracy that wasn’t

In this edition of Tech Time Warp we go back to April 14, 1995, when the Chinese government began widespread efforts to stop its government agencies from using pirated software. The move came after a Feb. 27, 1995, accord agreement...

/ April 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...

/ April 18, 2024
QR code phishing: What MSPs need to know to protect their customers

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ April 12, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
How artificial intelligence is changing the threat landscape

How artificial intelligence is changing the threat landscape

the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

/ April 1, 2024
Data tampering is an underrated threat — get your backup ready

Data tampering is an underrated threat — get your backup ready

World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

/ March 31, 2024
Tip Tuesday: Educating customers on the importance of backup for World Backup Day

Tip Tuesday: Educating customers on the importance of backup for World Backup Day

World Backup Day, recognized on March 31 every year, serves as a reminder for managed service providers (MSPs) to reprioritize their client’s data security. As the threat landscape continues to evolve and cyber attacks grow increasingly sophisticated, a robust and...

/ March 19, 2024