Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

April 15, 2022

What Is Cyber Resilience?

Rotem Shemesh

What is cyber resilience and why is it so important?

Read Now
Datto SIRIS Ransomware Detection Screenshot
April 13, 2022

What Is Agent Tesla Spyware and How Does It Work?

Ofir Yaakobi

Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.

Read Now
March 31, 2022

Datto’s Response to Spring4Shell

Emilyann Fogarty

On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.

Read Now

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
March 23, 2022

What is Nvidia RTX-LHR v2 Unlocker and How Does it Work?

Maor Dahan

On February 22, the crypto mining community received a massive fake news alert that claimed to successfully unlock the Nvidia LHR mining prevention feature. This was later reported as malware and is what we refer to as community phishing.

Read Now
March 15, 2022

The Evolution of Datto’s Application Security Program and BSIMM

Nicole Holden

Security has been, and continues to be one of the primary focuses of Datto in our effort to provide best-in-class solutions to our partners.

Read Now
March 14, 2022

Defend and Protect Your Microsoft Teams Data with Datto

Erin Stephan

Microsoft only assures service availability to Teams’ 270 million monthly active users, and not the data within, making it necessary for businesses to implement an integrated solution that provides Microsoft Teams users with data backup plus advanced threat protection.

Read Now
March 03, 2022

Conti Ransomware – How it Works and 4 Ways to Protect Yourself

Ofir Yaakobi

With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.

Read Now

Top 20 Most Common Hacker Behaviors

Elizabeth Fichtner

The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers.

Read Now