Blog
Digital attackers used a fake confirmation email from foreign exchange and international service Moneycorp to infect recipients with the AveMaria infostealer.
Read moreTwo months after the Colonial Pipeline attack we’re still discovering what the full legacy of the ransomware attack may look like. Here is what we know so far.
Read moreRead about how digital attackers used a fake letter of complaint from an American-owned spirits company to target recipients with JSSLoader malware.
Read moreToday’s MSPs use automation to streamline services in a number of ways, but there are valuable parts of the sales cycle where a human element is needed instead.
Read moreBiden Administration responds to recent cybersecurity attacks requiring federal agencies adopt zero-trust architecture and uphold security best practices such as encryption and MFA.
Read moreThe threat actor responsible for the SolarWinds supply chain attack is making headlines once again with a new email phishing operation.
Read moreWhen hackers found their way into a healthcare organization's network, the IT director had to do ransomware damage control. Read what he learned in this blog.
Read moreDigital attackers are using security awareness as a theme in their attack emails to steal cryptocurrency owners’ QR pairing codes.
Read moreCollecting MSP customer info is important for retention and account opportunity. Learn how to fix PSA data practices and harness your employees to record it.
Read moreMalicious actors leveraged a new technique for a certificate errors phishing campaign in which they scraped real certificate data and included it in their attack email.
Read moreThe Colonial Pipeline Company fell victim to DarkSide, a ransomware operation which closed shop after its attack made international headlines and attracted the attention of the FBI.
Read moreCo-Author: Madison Arcemont
Read more