Results for: tech time warp

Tip Tuesday
Tip Tuesday: Lead generation for MSP marketing

Tip Tuesday: Lead generation for MSP marketing

This month’s Tip Tuesday dives into how many managed service provider (MSP) businesses need help attracting leads. Instead, they tailor their marketing strategy to focus on something else. While this might help companies in the beginning phases and even attract...

/ September 19, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: OneNote malware delivery

Cybersecurity Threat Advisory: OneNote malware delivery

Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

/ February 7, 2023
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Java cloud migration
Java cloud migration starting to accelerate

Java cloud migration starting to accelerate

Managed service providers can gain insight into the rate at which production applications are moving into the cloud from a survey of 1,800 developers published today by The Eclipse Foundation. The survey finds that half the respondents are running less...

/ April 24, 2018
ransomware protection
The never-ending battle against ransomware

The never-ending battle against ransomware

Ransomware has largely faded from the headlines since WannaCry and NotPetya wreaked havoc across the globe in 2017. In some ways, ransomware creators were victims of their own success. The attacks garnered so much attention that, as Malwarebytes’ Chris Boyd told...

/ February 27, 2018 / 1 Comment

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017