We Need To Stop Preparing For The Last War | ConnectWise CyberSEC 2022

Small and medium businesses are not safe from these attacks. Some affiliates are specialized in targeting the SMB segment, often using different initial vectors than for enterprises. Ransom is based…

Why you might consider working with an MSP to obtain cyber insurance

Cyber insurance is quickly becoming one of the most essential cybersecurity services available to an organization. Unlike traditional services that offer defense, proactive threat hunting, or reactive remediation, cyber insurance…

MSP Blueprint for Efficient Detection and Response

The complex security solution landscape makes it difficult for organizations to design the right security stack or processes and select vendors that can enable them to become cyber resilient.  These…

Security Blueprint: Understanding the Sales Process & Technical Requirements

A solid security blueprint helps you provide customers with the knowledge and solutions they need to protect their data and systems. But to ensure its success, you need to develop…

What the Log4Shell Bug Means for SMBs: Experts Weigh In

An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. News of…

REvil/Sodinokibi Ransomware: Origin, Victims, Prevention Strategies

This post is also available in: Danish Cyberattacks have become a part of our reality, but have you ever wondered what might happen if your company gets targeted? You probably…

New Ceeloader Malware Used By Russian-backed Advanced Persistent Threat (APT) Organization Nobelium

Nobelium is a Russian-backed advanced persistent threat (APT) organization that achieved attention towards the end of 2020 after breaching SolarWinds’ software development supply chain to obtain access to espionage targets,…

Hackers are using this new malware which hides between blocks of junk code

A Russian-government back hacking group linked to the SolarWinds supply chain attack has developed new malware which has been used to conduct attacks against businesses and governments in North America and Europe…

SolarWinds hackers kept busy in the year since the seminal hack, Mandiant finds

Written by AJ Vicens Dec 6, 2021 | CYBERSCOOP Hackers associated with the SolarWinds supply chain compromise have been busy in the year since that attack was revealed, compromising multiple…

What's Included in a Security Blueprint?

Evolving cybersecurity threats and a crowded technology marketplace are seeing businesses struggle to protect their customers and employees. As a result, managed service providers (MSPs) have an opportunity to help…