Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

68% of cyberattacks start with stolen credentials

More than 16 billion passwords, cookies and tokens were recently exposed in one of the largest data breaches in history. The scale of the theft, with data from services including Google, Apple, Facebook, Amazon and Microsoft, makes one conclusion clear: credentials are the first step in compromising critical data.

The Warning Signs You Can't Ignore: From Your Body to Your Business

We’ve all been there, pushing through a cold, a nagging pain, or a persistent feeling of being "off." We tell ourselves it’s nothing, that we’re too busy to slow down. I did the same thing, ignoring my body’s subtle whispers until they turned into a deafening roar. One moment, I was pushing through a typical day, and the next, I was in a hospital bed, a stark reminder that ignoring warning signs can have serious consequences.

SimpleHelp: CISA warns of critical vulnerabilities in remote access software

The recent alert issued by the US Cybersecurity and Infrastructure Security Agency (CISA) about vulnerabilities in SimpleHelp remote support software highlights the growing risk in the software supply chain, making it a real threat to MSPs and their clients.

What Akira Ransomware Gang Taught This Company

What is ransomware? Ransomware is a form of malicious software that encrypts an organization’s files or systems, effectively locking users out until a ransom is paid, usually in cryptocurrency. But in 2025, ransomware is more than just malware. It’s a multi-billion-dollar criminal business. So far this year, 4,441 organizations have been publicly listed as ransomware victims.

Next-Gen Firebox Tabletop Series from WatchGuard Brings Flexible, Powerful, and Future-Ready Firewalls to MSPs

WatchGuard's new T Series Fireboxes provide intelligent firewall security, AI-powered threat detection, and eco-conscious hardware, giving managed service providers (MSPs) stronger threat protection with less complexity and waste.

Meet the New Firebox T Series: Smarter, Stronger, and Ready for Real-World Cyberthreats

With evolving cyber threats and rapidly advancing technologies, today’s SMBs have no choice but to modernize their networks to stay secure, efficient, and competitive. WatchGuard is ready to support them with the launch of the next-gen Firebox Tabletop Series: Future-ready firewalls built for how businesses operate now and where they’re headed next.

Summer, AI, and Identity-Based Threats: A Strategic Wake-Up Call for MSPs

As CSOs, we know cybercriminals don't clock out for summer. If anything, the seasonal drop in staffing and vigilance creates ideal conditions for identity-based attacks, especially for MSPs juggling multiple client environments. You need more than ever security that “just works” even under imperfect conditions with tools that remain reliable and effective—not fragile theory.

Wi-Fi Intrusion from neighboring networks, how to stop the Nearest Neighbor Attacks

Wireless networks have traditionally been a weak point in corporate cybersecurity. However, what was once a localized risk, limited to an office space, has now evolved into a more sophisticated threat, making detection more difficult.

The 5 Most Common Cybersecurity Pitfalls MSPs Must Avoid

Managing cybersecurity as a managed service provider isn’t getting any easier. You’re juggling a fast-evolving threat landscape, rising customer expectations, and fierce competition ‒ all while trying to grow your business and protect your clients. Even the most experienced MSPs can fall into common traps that drain profits, overcomplicate operations, and increase security risk. Here are five pitfalls that might be holding your business back ‒ and how to sidestep them.

Beyond the Operating System: Ransomware in the CPU

Being alert to ransomware is nothing new. Ransomware can wreak havoc and often cause permanent damage to endpoints, unless effective recovery processes are in place. Many ransomware operators attempt to delete shadow copies and other recovery methods, which makes redundancy in recovery essential. However, the situation becomes even more serious with the emergence of microcode ransomware.