Category: Threats

Dive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.

March 14, 2022

Defend and Protect Your Microsoft Teams Data with Datto

Erin Stephan

Microsoft only assures service availability to Teams’ 270 million monthly active users, and not the data within, making it necessary for businesses to implement an integrated solution that provides Microsoft Teams users with data backup plus advanced threat protection.

Read Now
March 03, 2022

Conti Ransomware – How it Works and 4 Ways to Protect Yourself

Ofir Yaakobi

With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.

Read Now

Top 20 Most Common Hacker Behaviors

Elizabeth Fichtner

The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers.

Read Now
March 01, 2022

Dealing with DarkSide

Elizabeth Fichtner

How to deal with DarkSide – a group that packages and provides ransomware capabilities as a service

Read Now
Datto SIRIS Ransomware Detection Screenshot
February 24, 2022

Recent Increase in Wiper Malware Attacks – MSPs Heed Warnings

Ryan Weeks

In the wake of recent international events, the world is facing elevated threats of cybersecurity breaches.

Read Now

Using Sender Policy Framework to Mitigate Spoofing

Tulsie Narine

What is Sender Policy Framework (SPF) and how exactly does the protocol work?

Read Now

Log4J Exploit Detection (CVE-2021-44228)

Elizabeth Fichtner

CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.

Read Now
February 14, 2022

7 Risks Posed by Open-Source Software and How to Defend Yourself

Elizabeth Fichtner

Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.

Read Now
February 09, 2022

Cobalt Strike: The New Favorite Among Thieves

Chris Gerritz

Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).

Read Now