Results for: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Navigating holiday cyber risks

Cybersecurity Threat Advisory: Navigating holiday cyber risks

The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

/ November 27, 2023 / 13 Comments
Tech Time Warp: Kenzero more than Kenough in terms of problems

Tech Time Warp: Kenzero more than Kenough in terms of problems

It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

/ November 24, 2023
Defense against cybercrime
Awareness is a tried-and-true cybercrime defense mechanism

Awareness is a tried-and-true cybercrime defense mechanism

I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...

/ November 23, 2023
Shields Up
Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...

/ November 16, 2023
combatting cyberattacks
Utilizing news resources as a cybersecurity tool

Utilizing news resources as a cybersecurity tool

One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...

/ November 9, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...

/ November 8, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: HelloKitty group targets Apache

Cybersecurity Threat Advisory: HelloKitty group targets Apache

This Cybersecurity Threat Advisory discusses a new critical security flaw that was discovered in the Apache ActiveMQ open-source message broker service. This security flaw can potentially result in remote code execution, which is currently being exploited by the HelloKitty ransomware...

/ November 8, 2023
5 best practices for MSP email security

5 best practices for MSP email security

Email remains the primary entry point for most cyberattacks, whether phishing, ransomware, social engineering scams, or business email compromise (BEC). According to data from Barracuda, 75 percent of organizations were the victim of a successful email attack in 2022, and...

/ November 6, 2023
How MSPs should navigate the rise of cryptomining

How MSPs should navigate the rise of cryptomining

Bitcoin value has been steadily climbing over the last year. Between March 2022 and November 2022, Bitcoin prices crashed from over $47,000 to around $16,000, however rising investor confidence has pushed Bitcoin back up over the $35,000 mark in October...

/ November 1, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: NetScaler vulnerability exploited

Cybersecurity Threat Advisory: NetScaler vulnerability exploited

A critical information disclosure vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway has been exploited in the wild as a zero-day vulnerability beginning in late August 2023. This vulnerability is identified to be exploited remotely and with no...

/ October 24, 2023