Search Results for "cryptocurrency"

Hackers Threaten Home Invasion Using Stolen Cryptocurrency Account Data

Cybercriminals threaten Bitcoin investors by relying on data stolen from cryptocurrency solution provider Ledger earlier this year.

Kaseya Patches VSA Vulnerability, Protects Against Monero Cryptocurrency Mining Malware

Kaseya has discovered and patched a security vulnerability in VSA. Hackers can use the vulnerability to install Monero cryptocurrency mining malware.

5 Channel Partner Program and MSP News Updates: 12 January 2022

Today’s channel partner program & MSP news involves Action1, Automation Anywhere, Bregal Milestone, Brigantia, CyberMDX, Cytera, Devo, Eureka, Microsoft, Netrix, OceanSound, Palo Alto Networks, Redstor, RiverMeadow, SADA, SentryBay, Stratodesk, Telus, vArmour, Wipro & more. Sip up.

Two Malicious Insider Threats MSPs Must Address

Malicious insiders are a cybersecurity risk that every business┬ámust┬ámitigate. Here’s how MSPs can defend against these threats and protect customers.

Emerging Trends From a Year of Cybersecurity Threats

Cybersecurity Awareness Month is an excellent time to reflect on these top three emerging and key trends from the past year.

5 Channel Partner Program and MSP News Updates: 16 August 2021

Today’s channel partner program & MSP news involves Amazon Palm Print technology concerns, Intel Coinbase investment, Exchange Server vulnerabilities, FOCUS Investment Baking, N-able & more. Sip up.

Blacks In Technology BITCON 2021

BITCON 2021 is virtual conference from Blacks In Technology (BIT). Here are event dates, agenda, speakers & sponsors.

Threat Trends: DNS Security, Part 2

Part two focuses on the most active threat categories and those you’re most likely to encounter when compared to other industries.

HAFNIUM: First of Many Threat Actors to Exploit ProxyLogon

HAFNIUM compromised tens of thousands of organizations by misusing four zero-day vulnerabilities identified by Microsoft.

Threat Trends: DNS Security Research Findings

Here are the most active threat categories seen in DNS traffic. Plus, evidence of how one threat can lead to uncovering others, according to Cisco Systems.