Results for: ransomware
Healthcare is one of the most vulnerable verticals in 2021
Hackers view personal healthcare information as the holy grail of data, mining this data in exchange for currency on the dark web. HealthTech sounded this alarm in April of this year: As the attacks mature and get increasingly sophisticated, healthcare...
Cybersecurity Threat Advisory: Over 1 Million Windows RDP Credentials Leaked
Threat Update Hacker group UAS has had 1.3 million RDP credentials for Windows servers leaked by security researchers. The compromised credentials could possibly allow a malicious actor to log into a compromised RDP server. It is imperative to keep best...
Cybersecurity Threat Advisory: ATPs Exploiting FortiOS Vulnerabilities
Threat Update The FBI and CISA released a joint cybersecurity advisory documenting that a number of APTs have been seen in the wild scanning for three FortiOS vulnerabilities (CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812). These vulnerabilities, if exploited, can allow unauthorized remote...
Empowering clients with HIPAA-compliant WFH policies
For MSPs supporting the myriad businesses under HIPAA’s purview, the pandemic forcibly accelerated work-from-home policies that were, for many, already on the roadmap. Any forward-looking organization had anticipated future expansion of remote work practices. But the pandemic meant implementing such...
World Backup Day should focus on the recovery experience
The annual arrival of World Backup Day on the day before April Fool’s Day may not get the level of recognition it deserves, but it does provide a useful construct for managed service providers (MSPs) to draw attention to an...
Cybersecurity Threat Advisory: Purple Fox Rootkit
Threat Update The Purple Fox rootkit has recently improved propagation capabilities which makes it easier to spread through a network. This could make it easier for threat actors to steal data from or potentially infect compromised machines with other types...
Weak human links and zero-day cyberattacks
We’ve been taking a close look at the post-pandemic environment that MSPs are finding themselves navigating in 2021. One of the questions for many is what happens if the new normal doesn’t resemble the old normal? What if corporate campuses...
The long-term cybersecurity legacy of COVID-19
COVID vaccines are starting to be distributed and administered, cases have dropped, and a real sense of post-pandemic optimism pervades the planet as springtime begins in the northern hemisphere. Despite all of the real-world and cybersecurity challenges that came about...
Silver Sparrow malware comes home to roost in Macs
Something unusual has made news recently: Mac malware. The usually highly fortified – and pricier – Mac OS is much less prone to malware intrusions. But the discovery of Silver Sparrow malware, a malware that runs on both Intel and...
Cybersecurity Threat Advisory: Critical VMWare ESXi Vulnerabilities Exploited
Threat Update There are two critical remote code execution vulnerabilities (CVE-2019-5544 and CVE-2020-3992) within VMWare ESXi which allow attackers to effectively gain control of a virtual machine (VM), deploy ransomware, and encrypt ESXi virtual disk drives. These vulnerabilities are reported...