Blog

Digital attackers used a fake confirmation email from foreign exchange and international service Moneycorp to infect recipients with the AveMaria infostealer.
Read more
Two months after the Colonial Pipeline attack we’re still discovering what the full legacy of the ransomware attack may look like. Here is what we know so far.
Read more
Read about how digital attackers used a fake letter of complaint from an American-owned spirits company to target recipients with JSSLoader malware.
Read more
Today’s MSPs use automation to streamline services in a number of ways, but there are valuable parts of the sales cycle where a human element is needed instead.
Read more
Biden Administration responds to recent cybersecurity attacks requiring federal agencies adopt zero-trust architecture and uphold security best practices such as encryption and MFA.
Read more
The threat actor responsible for the SolarWinds supply chain attack is making headlines once again with a new email phishing operation.
Read more
When hackers found their way into a healthcare organization's network, the IT director had to do ransomware damage control. Read what he learned in this blog.
Read more
Digital attackers are using security awareness as a theme in their attack emails to steal cryptocurrency owners’ QR pairing codes.
Read more
Collecting MSP customer info is important for retention and account opportunity. Learn how to fix PSA data practices and harness your employees to record it.
Read more
Malicious actors leveraged a new technique for a certificate errors phishing campaign in which they scraped real certificate data and included it in their attack email.
Read more
The Colonial Pipeline Company fell victim to DarkSide, a ransomware operation which closed shop after its attack made international headlines and attracted the attention of the FBI.
Read more
Co-Author: Madison Arcemont
Read more