Tag: vulnerabilities

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Microsoft Windows vulnerabilities

Cybersecurity Threat Advisory: New Microsoft Windows vulnerabilities

Two new Microsoft vulnerabilities, CVE-2024-21302 and CVE-2024-38202, are impacting Windows systems. Read this Cybersecurity Threat Advisory to learn more about how these vulnerabilities can be leveraged to exploit Microsoft Windows and how to protect your systems. What is the threat?...

/ November 4, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited cryptojacking campaign impacting Docker

Cybersecurity Threat Advisory: Exploited cryptojacking campaign impacting Docker

A new cryptojacking campaign exploiting the Docker Engine API has been discovered. The large-scale hacking campaign is targeting Docker Swarm, Kubernetes, and Secure Socket Shell (SSH) servers. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk...

/ October 3, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Veeam Backup security flaws

Cybersecurity Threat Advisory: Veeam Backup security flaws

There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...

/ September 10, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SAP vulnerabilities

Cybersecurity Threat Advisory: Critical SAP vulnerabilities

SAP issued its August 2024 security patch update which included two critical flaws that enable attackers to bypass authentication and fully compromise affected systems. Review the details in this Cybersecurity Threat Advisory to learn how you can protect your SAP...

/ August 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Citrix has identified two critical vulnerabilities in its NetScaler products, including NetScaler Console, NetScaler SVM, and NetScaler Agent. These vulnerabilities can allow unauthorized access to sensitive data and lead to denial of service (DoS) attacks. Read this Cybersecurity Threat Advisory...

/ July 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Four vulnerabilities were found in Gogs Git Service, impacting multiple versions up to 0.13.0. The vulnerabilities can impact the confidentiality and availability of data, however, code execution is possible. Continue reading this Cybersecurity Threat Advisory to protect your accounts and...

/ July 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Five new vulnerabilities found in Zyxel NAS

Cybersecurity Threat Advisory: Five new vulnerabilities found in Zyxel NAS

Zyxel has released a patch for their NAS326 and NAS542 to fix five new vulnerabilities that have been discovered. These vulnerabilities affect devices with versions 5.21 (AAZF16/ABAG13) and earlier. Barracuda MSP recommends customers using these devices to follow the steps...

/ June 27, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerabilities in VMware

Cybersecurity Threat Advisory: Critical vulnerabilities in VMware

VMware has released updates addressing four security flaws in ESXi, Workstation, and Fusion. Two out of the four flaws, CVE-2024-22252 and CVE-2024-22253, were identified as critical with CVSS scores of 9.3 for Workstation/Fusion and 8.4 for ESXi. This Cybersecurity Threat...

/ March 8, 2024
Threat spotlight
Threat Spotlight: Web apps under active threat from 10-year-old Shellshock bugs and miners

Threat Spotlight: Web apps under active threat from 10-year-old Shellshock bugs and miners

The Shellshock bugs — there are six related CVE designations — have the highest severity rating of 10. They exist in the Unix Bash shell, which is the default command-line interface on all Linux, Unix, and Mac-based operating systems. If...

/ March 7, 2024
Food Supply
The role of MSPs in food supply chain cybersecurity

The role of MSPs in food supply chain cybersecurity

Food and cybersecurity seem like very different topics. When we think of our favorite potato chips or steaks to sizzle on the grill, ransomware isn’t the first thing that comes to mind. However, the food supply chain is under increasing...

/ March 7, 2024