Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

Log4Shell RMM Community Script Explained (Video)
December 17, 2021

Log4Shell RMM Community Script Explained (Video)

Ryan Weeks

In response to the critical vulnerability referred to as Log4j, Datto released a Community Script for all MSPs earlier this week on Github. This in-depth explainer video details how to access, apply, run, and interpret the results of the Community Script.

Read Now
Datto releases Log4Shell RMM component for Datto partners and MSP community
December 13, 2021

Datto releases Log4Shell RMM component for Datto partners and MSP community

Ryan Weeks

In response to the critical vulnerability referred to as Log4j, Datto released both a Datto RMM component for our partners and a community script for all MSPs.

Read Now
Datto’s Response to Log4Shell
December 11, 2021

Datto’s Response to Log4Shell

Ryan Weeks

Datto has not assessed any material exposure to the log4j vulnerability that would impact the safe use of Datto products at this time. Should this assessment change, we will update Datto partners immediately.

Read Now
Emotet Malware: How Does it Work and How Can it be Stopped?
December 08, 2021

Emotet Malware: How Does it Work and How Can it be Stopped?

Ofir Yaakobi

Emotet, once described as the “world’s most dangerous malware”, was first discovered as a banking Trojan in 2014 and over the years has evolved into the go-to solution for cybercriminals.

Read Now
Tips to Consider when Expanding into Cybersecurity
November 23, 2021

Tips to Consider when Expanding into Cybersecurity

Chris Henderson

For many MSPs, cybersecurity is a phenomenal opportunity to add value to clients, and add revenue streams to their existing business operations.

Read Now
What is Bazar Loader and How to Prepare?
November 18, 2021

What is Bazar Loader and How to Prepare?

Rotem Shemesh

Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.

Read Now
Strong Supply Chain Security Starts with Secure Software
November 17, 2021

Strong Supply Chain Security Starts with Secure Software

Emilyann Fogarty

In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.

Read Now
Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation
October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now
Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation
October 18, 2021

Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation

Cristofer Sochacki

Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?

Read Now