Category: Threats

Dive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.

What is Maze Ransomware and How Does it Work?
May 18, 2021

What is Maze Ransomware and How Does it Work?

Rotem Shemesh

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019. It has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly – MSPs.

Read Now
Four Essential Components of Third-Party Risk Management
May 12, 2021

Four Essential Components of Third-Party Risk Management

Jaime Arze

Security considerations do not stop at the perimeter of our networks. We must take into account the posture of vendors who process our data, integrate with our systems, or those who we rely on in our day-to-day operations.

Read Now
How to Spot and Protect Against Phishing Email Attacks
April 17, 2021

How to Spot and Protect Against Phishing Email Attacks

George Rouse

Phishing is a form of social engineering that attempts to secure a user’s personal information such as bank account details or access to their personal information. Here’s how to avoid it.

Read Now
What is CryptoLocker Ransomware and How Does it Work?
March 24, 2021

What is CryptoLocker Ransomware and How Does it Work?

Courtney Heinbach

MSPs report CryptoLocker is the #1 ransomware strain affecting their clients. Here’s what you need to know about it.

Read Now
What is CTB-Locker Ransomware and How Does it Work?
March 16, 2021

What is CTB-Locker Ransomware and How Does it Work?

Courtney Heinbach

While there’s no foolproof way to protect against ransomware, there are steps MSPs can take to educate their staff and their clients about the various ransomware strains that could drastically impact business operations.

Read Now
Silver Sparrow Dropper Flies Through macOS Detection; Free Script Available for MSPs
February 23, 2021

Silver Sparrow Dropper Flies Through macOS Detection; Free Script Available for MSPs

Dan Garcia

As a threat emerged this week in the form of a new dropper called Silver Sparrow, the Datto RMM engineering team sprung into action and has developed a free script for MSPs that detects the presence of this dropper.

Read Now
How MSPs Can Detect Crypto-Ransomware with Datto RMM
February 17, 2021

How MSPs Can Detect Crypto-Ransomware with Datto RMM

Sara Zorica

Ransomware is a massive problem for businesses of all sizes. Learn how Datto RMM helps MSPs detect ransomware and respond accordingly to avoid client downtime.

Read Now
Improve Business Security with Ransomware Detection
February 10, 2021

Improve Business Security with Ransomware Detection

David Weiss

Datto RMM now provides an extra layer of security with native ransomware detection. It detects ransomware on endpoints using behavioral analysis.

Read Now
FireEye Breach: Countermeasure Scanner Available for MSP RMM Tools
December 17, 2020

FireEye Breach: Countermeasure Scanner Available for MSP RMM Tools

Ryan Weeks

Datto has created a FireEye Red Team Countermeasure Scanner that leverages the FireEye published detection methods. MSPs can use the scanner to detect indicators that the stolen tools are being, or have been, used on managed systems.

Read Now