What Is a Supply Chain Attack and How Can I Protect Against It?
Rotem Shemesh
With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.
Read NowCheck out our resources on Threat Analysis to understand the process of identifying, assessing, and responding to cyber threats. Learn how to use analysis to enhance your organization’s security posture.
Rotem Shemesh
With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.
Read NowOfir Yaakobi
QBot, also known as Qakbot, QBot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007.
Read NowOfir Yaakobi
Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.
Read NowEmilyann Fogarty
On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.
Read NowMaor Dahan
On February 22, the crypto mining community received a massive fake news alert that claimed to successfully unlock the Nvidia LHR mining prevention feature. This was later reported as malware and is what we refer to as community phishing.
Read NowOfir Yaakobi
With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.
Read NowElizabeth Fichtner
CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.
Read NowChris Gerritz
Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Read NowRotem Shemesh
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.
Read Now