Results for: ransomware

Cybersecurity Threat Advisory: End-of-Life Microsoft Exchange servers exposed
In this Cybersecurity Threat Advisory, we look at how over 20,000 Microsoft (MS) Exchange email servers across Europe, the U.S., and Asia are at risk of cyberattacks due to running on unsupported software versions. These servers are susceptible to numerous...

Scattered Spider spins a troublesome web
The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

Ask an MSP Expert: How do seasoned MSPs outsmart threats?
In this edition of Ask an MSP Expert, we look at how with the ever-evolving cybersecurity landscape, managed service providers (MSPs) must be vigilant. This includes ensuring their managed security service offerings are up to the task of protecting their...

Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a cybersecurity advisory warning that ransomware groups are actively exploiting the ‘Citrix Bleed’ vulnerability. In this Cybersecurity Threat Advisory, we look at the Citrix...

Cybersecurity Threat Advisory: Navigating holiday cyber risks
The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

Tech Time Warp: Kenzero more than Kenough in terms of problems
It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

Awareness is a tried-and-true cybercrime defense mechanism
I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies
“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...

Utilizing news resources as a cybersecurity tool
One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...

Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities
Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...