Tag: cyberattack

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: AnyDesk production system breach

Cybersecurity Threat Advisory: AnyDesk production system breach

AnyDesk confirmed that a cyberattack on their production systems has taken place. This has caused AnyDesk users to become vulnerable to data breaches, phishing attacks, and malware. Barracuda MSP recommends updating to the latest version of Windows (8.0.8) immediately and...

/ February 5, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

Cybersecurity Threat Advisory: The mother of all breaches (MOAB)

A massive data leak that includes information from several past breaches with a staggering 12 terabytes of data, covering at least 26 billion records, is available on the dark web. This breach involved user data from platforms such as LinkedIn,...

/ January 30, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Rising concerns over ALPHV ransomware group

Cybersecurity Threat Advisory: Rising concerns over ALPHV ransomware group

In recent weeks, there has been a surge in cyberattacks attributed to the ALPHV ransomware group. Some of the group’s latest hits include attacks against Tipalti, MGM Resorts, Caesars Entertainment, Clorox, McClaren Health Care, Fidelity National Financial, Five Guys, Estée...

/ December 7, 2023
What exactly is killware, and why is it the next major cyberthreat?

What exactly is killware, and why is it the next major cyberthreat?

Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years, and it’s now a major security issue for organizations....

/ September 5, 2023
Cybersecurity insurance becomes a barometer for MSPs

Cybersecurity insurance becomes a barometer for MSPs

Managed service providers (MSPs) looking to minimize their cybersecurity risks might want to take notice of how many of their customers have cybersecurity insurance. A survey of 500 small-to-medium enterprises (SMEs) conducted by Cowbell, a provider of cybersecurity insurance, finds...

/ June 5, 2023
Ransomware continues to impact schools

Ransomware continues to impact schools

The city of Des Moines, Iowa, is accustomed to seeing its schools close in January, but the closings usually involve snow or ice, not a cyberattack. On January 10 and 11 of this year, however, Des Moines Public Schools were...

/ February 23, 2023
Preparation is key to defend against cybersecurity catastrophes

Preparation is key to defend against cybersecurity catastrophes

MSPs are usually involved in the daily grind of warding off cybercriminals who resort to phishing attempts or DDoS attacks, but what if something much more sinister was lurking out there? According to the World Economic Forum’s Global Cybersecurity Outlook...

/ January 31, 2023
Canadian cybersecurity complacency is a slippery slope

Canadian cybersecurity complacency is a slippery slope

Statistics and polls show that residents of the United States are concerned about cybersecurity and a recent survey conducted late in 2021 illustrates this: The poll by The Pearson Institute and The Associated Press-NORC Center for Public Affairs Research shows...

/ August 30, 2022
Why MSPs are attractive cyberattack targets

Why MSPs are attractive cyberattack targets

Once again, government watchdogs have issued an alert to managed service providers (MSPs), encouraging them to implement new security guidance in response to increasing levels of cyberattacks. MSPs are a prime target for cybercriminals – they have direct access to...

/ August 2, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: critical vulnerability affecting Atlassian Confluence Server

Cybersecurity Threat Advisory: critical vulnerability affecting Atlassian Confluence Server

A zero-day exploit has been discovered in all versions of Atlassian Confluence Server and Data Center products. This vulnerability is actively being exploited by cyberattackers. It allows threat actors to gain full control of vulnerable systems without using credentials and...

/ June 4, 2022