Blog
![](/sites/default/files/styles/resource_image/public/2021-07/spoofing_thumb%20%281%29.jpg?itok=tMISmMDR)
Digital attackers used a fake confirmation email from foreign exchange and international service Moneycorp to infect recipients with the AveMaria infostealer.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/cloud_with_lock_thumb.jpg?itok=8PL2Tyqf)
Two months after the Colonial Pipeline attack we’re still discovering what the full legacy of the ransomware attack may look like. Here is what we know so far.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/SpiritsJSSLoader-Main-blog-image%20%281%29.jpg?itok=mdO12KWu)
Read about how digital attackers used a fake letter of complaint from an American-owned spirits company to target recipients with JSSLoader malware.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/handoff.jpg?itok=Hk5LMVXA)
Today’s MSPs use automation to streamline services in a number of ways, but there are valuable parts of the sales cycle where a human element is needed instead.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/EO_image.jpg?itok=ZtJnhNUk)
Biden Administration responds to recent cybersecurity attacks requiring federal agencies adopt zero-trust architecture and uphold security best practices such as encryption and MFA.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/usaid_email.jpg?itok=hXYIWmnC)
The threat actor responsible for the SolarWinds supply chain attack is making headlines once again with a new email phishing operation.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/beware_ransomware.jpg?itok=50ljAToe)
When hackers found their way into a healthcare organization's network, the IT director had to do ransomware damage control. Read what he learned in this blog.
Read more![](/sites/default/files/styles/resource_image/public/2021-06/blochain_qr_thumb.jpg?itok=VbeYghnE)
Digital attackers are using security awareness as a theme in their attack emails to steal cryptocurrency owners’ QR pairing codes.
Read more![](/sites/default/files/styles/resource_image/public/2021-05/harness_thumb_0.jpg?itok=Ag4f30mD)
Collecting MSP customer info is important for retention and account opportunity. Learn how to fix PSA data practices and harness your employees to record it.
Read more![](/sites/default/files/styles/resource_image/public/2021-05/shopify_scrapecert.jpg?itok=1fEIflGQ)
Malicious actors leveraged a new technique for a certificate errors phishing campaign in which they scraped real certificate data and included it in their attack email.
Read more![](/sites/default/files/styles/resource_image/public/2021-05/pipeline_image.jpg?itok=H9_Nyq_i)
The Colonial Pipeline Company fell victim to DarkSide, a ransomware operation which closed shop after its attack made international headlines and attracted the attention of the FBI.
Read more![](/sites/default/files/styles/resource_image/public/2021-05/best_practices_thumb.jpg?itok=ilUydunp)
Co-Author: Madison Arcemont
Read more