Results for: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: End-of-Life Microsoft Exchange servers exposed

Cybersecurity Threat Advisory: End-of-Life Microsoft Exchange servers exposed

In this Cybersecurity Threat Advisory, we look at how over 20,000 Microsoft (MS) Exchange email servers across Europe, the U.S., and Asia are at risk of cyberattacks due to running on unsupported software versions. These servers are susceptible to numerous...

/ December 5, 2023
Scattered Spider spins a troublesome web

Scattered Spider spins a troublesome web

The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

/ November 30, 2023
Ask an MSP Expert
Ask an MSP Expert: How do seasoned MSPs outsmart threats?

Ask an MSP Expert: How do seasoned MSPs outsmart threats?

In this edition of Ask an MSP Expert, we look at how with the ever-evolving cybersecurity landscape, managed service providers (MSPs) must be vigilant. This includes ensuring their managed security service offerings are up to the task of protecting their...

/ November 30, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited

Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a cybersecurity advisory warning that ransomware groups are actively exploiting the ‘Citrix Bleed’ vulnerability. In this Cybersecurity Threat Advisory, we look at the Citrix...

/ November 29, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Navigating holiday cyber risks

Cybersecurity Threat Advisory: Navigating holiday cyber risks

The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

/ November 27, 2023 / 13 Comments
Tech Time Warp: Kenzero more than Kenough in terms of problems

Tech Time Warp: Kenzero more than Kenough in terms of problems

It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

/ November 24, 2023
Defense against cybercrime
Awareness is a tried-and-true cybercrime defense mechanism

Awareness is a tried-and-true cybercrime defense mechanism

I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...

/ November 23, 2023
Shields Up
Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...

/ November 16, 2023
combatting cyberattacks
Utilizing news resources as a cybersecurity tool

Utilizing news resources as a cybersecurity tool

One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...

/ November 9, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...

/ November 8, 2023