
Log4J Exploit Detection (CVE-2021-44228)
Elizabeth Fichtner
CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.
Read NowDive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.

Elizabeth Fichtner
CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.
Read Now
Elizabeth Fichtner
Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.
Read Now
Chris Gerritz
Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Read Now
Ryan Weeks
CISO Ryan Weeks sits down with Director of Security Solutions Chris McKie for a fireside-style chat to talk all things ransomware.
Read Now
Elizabeth Fichtner
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Read Now
Rotem Shemesh
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.
Read Now
Chris Henderson
Based on a published article reporting the findings of a ransomware group named ‘Conti’, the Datto Information Security Team recommends all MSPs evaluate their devices/endpoints for Atera agent activity and determine its legitimacy if necessary.
Read Now
Ryan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released a Community Script for all MSPs earlier this week on Github. This in-depth explainer video details how to access, apply, run, and interpret the results of the Community Script.
Read Now
Ryan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released both a Datto RMM component for our partners and a community script for all MSPs.
Read Now