Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

What’s the Difference Between Hacking and Phishing?
April 27, 2022

What’s the Difference Between Hacking and Phishing?

George Rouse

Learn the difference between hacking and phishing and best practices for online safety.

Read Now
What Is Cybersecurity?

What Is Cybersecurity?

George Rouse

Cybersecurity involves protecting your business’ online systems against cyberattacks. This means safeguarding any servers, desktop computers, or mobile devices you and your customers use.

Read Now
What Is Ransomware as a Service (RaaS)?

What Is Ransomware as a Service (RaaS)?

George Rouse

RaaS is a common acronym used to refer to ransomware as a service. Ransomware as a service (RaaS) is the offering of pay-for-use malware.

Read Now
What Is Cyber Resilience?
April 15, 2022

What Is Cyber Resilience?

Rotem Shemesh

What is cyber resilience and why is it so important?

Read Now
What Is Agent Tesla Spyware and How Does It Work?
April 13, 2022

What Is Agent Tesla Spyware and How Does It Work?

Ofir Yaakobi

Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.

Read Now
Datto’s Response to Spring4Shell
March 31, 2022

Datto’s Response to Spring4Shell

Emilyann Fogarty

On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.

Read Now
What Is Email Spoofing and How to Protect Against It?

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
What is Nvidia RTX-LHR v2 Unlocker and How Does it Work?
March 23, 2022

What is Nvidia RTX-LHR v2 Unlocker and How Does it Work?

Maor Dahan

On February 22, the crypto mining community received a massive fake news alert that claimed to successfully unlock the Nvidia LHR mining prevention feature. This was later reported as malware and is what we refer to as community phishing.

Read Now
The Evolution of Datto’s Application Security Program and BSIMM
March 15, 2022

The Evolution of Datto’s Application Security Program and BSIMM

Nicole Holden

Security has been, and continues to be one of the primary focuses of Datto in our effort to provide best-in-class solutions to our partners.

Read Now