Results for: ransomware

Swifties can pose cyber risks
If you are like me, the whole Taylor Swift-Travis Kelce romance isn’t keeping you up at night. Taylor Swift can be an economic boom to cities where she tours, but she can also be an unintentional cyber risk to her legions...

Cybersecurity Threat Advisory: End-of-Life Microsoft Exchange servers exposed
In this Cybersecurity Threat Advisory, we look at how over 20,000 Microsoft (MS) Exchange email servers across Europe, the U.S., and Asia are at risk of cyberattacks due to running on unsupported software versions. These servers are susceptible to numerous...

Scattered Spider spins a troublesome web
The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

Ask an MSP Expert: How do seasoned MSPs outsmart threats?
In this edition of Ask an MSP Expert, we look at how with the ever-evolving cybersecurity landscape, managed service providers (MSPs) must be vigilant. This includes ensuring their managed security service offerings are up to the task of protecting their...

Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a cybersecurity advisory warning that ransomware groups are actively exploiting the ‘Citrix Bleed’ vulnerability. In this Cybersecurity Threat Advisory, we look at the Citrix...

Cybersecurity Threat Advisory: Navigating holiday cyber risks
The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

Tech Time Warp: Kenzero more than Kenough in terms of problems
It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

Awareness is a tried-and-true cybercrime defense mechanism
I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...