
What Is a Supply Chain Attack and How Can I Protect Against It?
Rotem Shemesh
With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.
Read NowDive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.
Rotem Shemesh
With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.
Read NowAriën van Wetten
With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.
Read NowOfir Yaakobi
QBot, also known as Qakbot, QBot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007.
Read NowGeorge Rouse
Fileless malware, a destructive and malicious software that uses legitimate programs to get into a computer and infect it, is a serious threat to businesses and individuals alike.
Read NowGeorge Rouse
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures.
Read NowGeorge Rouse
Learn the difference between hacking and phishing and best practices for online safety.
Read NowGeorge Rouse
RaaS is a common acronym used to refer to ransomware as a service. Ransomware as a service (RaaS) is the offering of pay-for-use malware.
Read NowOfir Yaakobi
Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.
Read NowEmilyann Fogarty
On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.
Read Now