Pages
- 2023 Predictions
- 25 years of Nuspire
- About Us
- Aftermarket Subaru Select Monitor (SSM) Diagnostics Software
- Automotive
- Become a Partner
- Blog
- Careers
- Channel Futures’ MSP Summit Form
- Channel Futures’ MSP Summit is Right Around the Corner – Will You Be There?
- Chris Roberts
- Construction
- Contact Us
- Cybersecurity Frequently Asked Questions
- Dan Hoban
- Emergency Breach Response
- Events & Webinars
- FAQ
- Financial
- FTC Safeguards
- FutureCon – Atlanta Cybersecurity Conference Form 2022
- Healthcare
- Hierarchy of Needs
- Homepage
- Industries
- Jeremy Herzog
- Join Nuspire at CornCon 8 – Quad Cities Cybersecurity Conference
- Join Nuspire at FutureCon – Atlanta Cybersecurity Conference
- Join Nuspire in Pittsburgh at the Three Rivers Information Security Symposium
- Josh Smith
- Justin Heard
- M1 Labs: Helping OEMs Securely Roll Out New Tech
- Manufacturing
- Mike Pedrick
- myNuspire Platform
- Nuspire Cybersecurity Experience
- Nuspire Mobile App
- Nuspire Quarterly Impact Report Q4 2023
- Nutron AI Assistant
- Our Pledge
- Partner Program Files – Burns & Wilcox
- Privacy Policy
- Professional Services
- Request a Consultation on FTC Safeguards
- Request a Consultation: Automotive Dealer Information Security Program
- Resource Video
- Retail
- RMISC Form
- RMISC is Right Around the Corner – Will You Be There?
- Schedule a Demo
- Security in Action Framework
- Security Reviews Frequently Asked Questions
- Services
- Cybersecurity Consulting
- Checklist: Best Practices for Responsible AI Use in Cybersecurity – Build Trust and Protect Data
- Checklist: Evaluating AI-Augmented Cybersecurity Service Providers – Find the Right AI-Powered Partner
- Digital Forensics
- eBook: The AI-Augmented Security Practitioner – Transforming Cyber Defense from Reactive to Predictive
- Guide: The Power of AI in Cybersecurity: 5 Key Use Cases
- Incident Readiness
- Incident Response
- Incident Response Readiness
- Security Posture Assessment
- Threat Modeling
- Virtual CISO and Executive Advisory Services
- Endpoint Detection and Response
- Managed Detection and Response
- Managed Security Services
- Cybersecurity Consulting
- Subaru Tech Form
- Subaru Tech Products
- SubaruDT Pre- Retailer Form
- SubaruDT Pre- Retailers
- Subscribe To Monthly Newsletter
- Terms & Conditions
- Three Rivers Information Security Symposium
- Waffle House in Littleton Event
- What Makes us Different
- When the Wheels Come Off: Bringing Order to Cyber Incident Chaos
- You’re Invited to a Private Dinner at RSA with Nuspire
Posts by category
- Category: Uncategorized
- Nuspire at InfoSec World 2024: Navigating AI and Cybersecurity Challenges
- CEO Corner: Building a Stronger Future Together: Nuspire and PDI Technologies
- Microsoft’s July 2024 Patch Tuesday Addresses 4 Zero-Days, 142 Vulnerabilities
- MDR’s Enduring Value – Beyond Buzzwords
- Microsoft’s November 2023 Patch Tuesday Addresses 3 Zero-Days, 104 Vulnerabilities
- How Asset Management Bolsters Cybersecurity
- The Top Cyberthreats that SMBs Should Look out for
- Nuspire Recognized as a ‘Best and Brightest Companies to Work For’
- How Pure-Play MSSPs Can Help Your Security Challenges
- Five Simple Steps to Secure WFH IoT Devices
- Category: Blog
- Is an AI-augmented SOC The Way Forward?
- Nuspire at CISO XC in Dallas: Customization, Transparency and Staying Ahead
- Navigating the Cybersecurity Risks of Shadow & Open-Source GenAI
- Microsoft’s October 2024 Patch Tuesday: Addressing 5 Zero-Days and 118 Vulnerabilities
- CEO Corner: Cybersecurity Awareness Month – Empowering Businesses to Stay One Step Ahead
- CISA Warns of Critical Vulnerabilities in Switches Used in Manufacturing
- SaaS Data Breaches on the Rise
- A Fresh Approach to Cybersecurity: Unifying Intelligence, Technology and Human Expertise
- AI in Cybersecurity: Experts Discuss Opportunities, Misconceptions and the Path Forward
- Microsoft’s September 2024 Patch Tuesday Addresses 4 Zero-Days, 79 Vulnerabilities
- Reimagining Incident Response: Unleashing Proactive Defense with Nuspire’s Cybersecurity Experience
- Transforming EDR: How Nuspire’s Cybersecurity Experience Elevates Endpoint Protection
- Transforming MDR: How Nuspire’s Cybersecurity Experience Takes Threat Detection and Response to the Next Level
- Introducing the Nuspire Cybersecurity Experience: A New Era of Intelligent Unification
- Redefining Cyber Defense: Introducing the Nuspire Cybersecurity Experience
- Meet Nutron: Your AI-Driven Ally in Proactive Cyber Defense
- Achieving Cyber Clarity: myNuspire for Unified Cybersecurity Management
- Empowering Cybersecurity on the Go: Nuspire’s Revolutionary Mobile App
- Ever-Increasing Data Breach Costs: Why and What to Do
- Manufacturing Security Vulnerabilities: Combating the Risks
- What is RBAC (Role-Based Access Control) and Why is it Important?
- CISA Warns of Critical SolarWinds RCE Vulnerability Exploited in Attacks
- Microsoft’s August 2024 Patch Tuesday Addresses 10 Zero-Days, 6 Exploited
- North Korean Hackers Exploit VPN Update Flaw to Deploy Malware
- CEO Corner: The Future of Security – Embracing AI with Human Expertise
- Unpacking the Q2 2024 Threat Report: Ransomware, Dark Web and Exploits
- Executive Cybersecurity Accountability: A Rising Trend?
- Multifactor Authentication (MFA) Failures and Surging Ransomware Losses: What’s Going On?
- Examining the Decrease in Cyber Insurance Rates
- Illuminating the Shadows: Insights from Cybersecurity Experts on Navigating the Dark Web
- The Importance of an Up-to-Date Information Security Plan for Automotive OEMs and Dealerships
- VMware vCenter RCE Vulnerability: What You Need to Know
- How Dark Web Monitoring and Tabletop Exercises Support Proactive Cybersecurity
- Nuspire at RMISC 2024: The Buzz, Challenges and Insights
- Microsoft’s June 2024 Patch Tuesday Addresses 1 Zero-Day, 51 Vulnerabilities
- Mastering the Art of Incident Response: From Chaos to Control
- Elevating Your Cybersecurity with the New Nuspire Cybersecurity Experience
- CEO Corner: Preparing for the Unavoidable – Why Incident Response Readiness is Non-Negotiable
- Key Takeaways from Upstream’s 2024 Automotive Cybersecurity Report
- When Ransomware Strikes: Lessons Learned from a Simulated Cyberattack
- Highlights of the New Verizon 2024 Data Breach Report
- Nuspire at NolaCon: Insights and Highlights from the Event
- QNAP QTS Zero-Days Publicly Exposed: What You Need to Know
- Microsoft’s May 2024 Patch Tuesday Addresses 3 Zero-Days, 61 Vulnerabilities
- Two F5 BIG-IP Next Central Manager Flaws Allow Device Takeover
- Cybersecurity on a Budget: Maximizing Your Defenses Without Breaking the Bank
- A CEO’s Insight: Proactive Cybersecurity in the Age of the Dark Web
- From Ransomware to Dark Web: Nuspire’s Q1 2024 Threat Report Webinar Highlights
- Okta Warns of Unprecedented Surge in Credential Stuffing Attacks
- Nuspire at the CISO XC Show: A Recap
- Dark Web Monitoring: What It Is and Why It’s Important
- PuTTY SSH Client Vulnerability Allows Private Key Recovery
- MDR and EDR – Why One Doesn’t Cancel Out The Other
- Microsoft’s April 2024 Patch Tuesday: Updates for 150 Vulnerabilities and Two Zero-Days
- MDR for Better Office 365 Security
- CEO Corner: Introducing the Digital Defender Digest Newsletter
- Mastering the MITRE ATT&CK Framework: Enhancing Cybersecurity with Device Log Mapping
- A Primer on SaaS Security Risks
- Event Recap: Highlights from Nuspire’s Time at FutureCon Baltimore
- CISA, NSA, FBI and Five Eyes Issue New Alert on Chinese APT Volt Typhoon
- Transportation Cybersecurity Threats: An Overview
- Microsoft’s March 2024 Patch Tuesday: Two Critical Security Updates Released
- Exploit Targets Critical Vulnerability in JetBrains’ TeamCity, Company Advises Immediate Update
- The MDR Promise: Fact or Fiction?
- A Look at Infostealers – A Growing Cyber Threat
- Top 5 Cybersecurity Mistakes Companies Make (And How To Reduce Their Risks)
- Major Cyberattack on UnitedHealth’s Optum Causes Widespread Healthcare Billing Disruption
- Top Cyber Threats Automotive Dealerships Should Look Out For
- Zoom Announces Critical Vulnerability for Desktop Application
- Microsoft’s February 2024 Patch Tuesday Addresses 2 Zero-Days and 73 Vulnerabilities
- Declining Ransomware Payments: Shift in Hacker Tactics?
- UPDATE: Ivanti Connect Secure Zero-Day Now Under Mass Exploitation
- New Ivanti Connect Secure Zero-Day Exploited by Threat Actors
- Diving into the 2024 Security Megatrends
- MDR and OT: Improving Cybersecurity for Manufacturers
- CISA Emergency Directive Demands Action on Ivanti Zero-Day Vulnerabilities
- FBI and CISA Warn of Androxgh0st Malware Attacks
- Over 178K SonicWall Firewalls Vulnerable to DoS, Potential RCE Attacks
- Microsoft’s January 2024 Patch Tuesday Addresses 49 Vulnerabilities, Including Two Critical Vulnerabilities
- Infostealers Abuse Google OAuth Endpoint to ‘Revive’ Cookies, Hijack Accounts
- EDR – More Than An Acronym
- What is Security Posture?
- Emerging Threat: What to Know About the Play Ransomware Group
- NIST Cybersecurity Framework – What it is and How it Compares to MITRE ATT&CK
- Threat Actors Exploiting Adobe ColdFusion Vulnerability: A Critical Situation for Federal Agencies
- Russian Threat Actors Exploit Outlook Flaw to Hijack Exchange Accounts
- Holiday Season Cyberattacks: What to Watch Out For
- NIST CSF 2.0: Changes and Implications
- Taking a Look at CISA’s Cybersecurity Toolkit for Healthcare
- SysAid Zero-Day Vulnerability Exploited in CL0P Ransomware Attacks
- Critical Security Alerts: Veeam and QNAP Address Vulnerabilities in Their Software
- Insider Threats in Cybersecurity: A Persistent Problem
- Unveiling the Newly Discovered StripedFly Malware
- A Primer on Privacy by Design
- Citrix Urges Immediate Patch for Critical NetScaler Vulnerability
- Generative AI Tools and Data Leaks: Preventing Data Loss
- The Importance of HR’s Role in Cybersecurity
- Microsoft’s October 2023 Patch Tuesday Addresses 3 Zero-Days, 104 Vulnerabilities
- AI Hallucinations: A Growing Cybersecurity Threat?
- Understanding the Value of Threat Intelligence
- October 2023 myNuspire Release Notes
- Atlassian Releases Emergency Updates for Confluence Data Center and Server Zero-Day
- Open Redirect Flaws as a Phishing Tactic
- Google Reclassifies libwebp Vulnerability to Critical Following Zero-Day Attacks
- Estimated 12,000 Juniper Devices Vulnerable to RCE Vulnerability
- New SEC Cybersecurity Disclosure Requirements – What You Need to Know
- Microsoft’s September 2023 Patch Tuesday Addresses 2 Zero-Days, 59 Vulnerabilities
- Back to Basics: The Key Elements of a Strong Security Program
- Qakbot Malware Disrupted in Multinational Cyber Takedown
- Hiring a Cybersecurity Consultant – Is It Worth It?
- Ransomware Surges in Nuspire’s Q2 2023 Threat Report
- CVSS 4.0: How Will it Change Vulnerability Management?
- A Deep Dive into CL0P Ransomware
- Why Companies Are Consolidating Their Security Tools
- Threat Roundup: Microsoft August Patch Tuesday & New PaperCut Vulnerability
- A Primer on Repojacking Attacks
- Analyzing Data Breaches by Industry
- How to Transform Patch Management Without Rip and Replace
- Breaking Down the SANS Top 5 Most Dangerous New Cyber Attacks
- Citrix Discloses Actively-Exploited Critical Vulnerability
- Microsoft’s July 2023 Patch Tuesday: 132 Vulnerabilities, 6 Zero-Days
- Microsoft Announces Unpatched Zero-Day Affecting Office Products
- The Importance of MDR in Today’s Threat Environment
- CISA Releases Joint Advisory on Truebot Malware
- Akira Ransomware Targets VMware ESXi Servers
- A Double Supply Chain Attack and The Importance of TPRM
- VMware Discloses Active Exploitation of Critical Vulnerability in Aria Operations Networks
- Critical Vulnerability Discovered in Patched Zyxel Storage Devices
- Advanced Phishing Attacks: How to Stem the Tide
- Emerging Trend: Malicious Use of New Google Domains .zip and .mov
- Malicious Online Bots: More Than Just a Nuisance
- Cybersecurity in Manufacturing: Key Threats and Risks
- Browser Security: Key Threats and Best Practices
- Threat Actors Exploiting MOVEit Transfer Zero-Day
- An Overview of Current CISO Challenges and Buying Trends
- Barracuda Patches Zero-Day in Email Security Gateways (ESG)
- KeePass Password Manager Vulnerability Reveals Master Password
- BianLian Ransomware Shifting Focus to Pure Data Extortion
- Nuspire’s Q1 2023 Cyber Threat Report Shows Spike in Exploits, Botnets and Malware
- Microsoft’s May Patch Tuesday Addresses 3 Zero-Days
- Get More from Microsoft Defender with a Managed Service Approach
- CISA Urges Organizations to Review FCC’s List of High-Risk Communications Equipment
- New All-in-One “EvilExtractor” Stealer Marketed on the Dark Web
- Lessons and Takeaways from the FBI’s 2022 Internet Crime Report
- Practical Ways to Optimize Your Security Tech Stack
- VMware Patches Critical vRealize Vulnerability
- Critical RCE Vulnerability Affecting PaperCut Software
- The Importance of Patch Management in Cybersecurity
- Microsoft, Fortinet, HashiCorp and Other Vendors’ April Patches Address Critical and High-Level Vulnerabilities
- A Refresher on the FTC Safeguards Rule
- Analyzing the Value of AI and Automation for Cybersecurity
- CISO Stress on the Rise
- The Ongoing Rise in IoT Attacks: What We’re Seeing in 2023
- Steps to Build a Successful Security Operations Center (SOC)
- Emotet and Other Malware Shifting Tactics to OneNote Files
- CISA Launches Ransomware Vulnerability Warning Pilot
- Microsoft’s 2023 Patch Tuesday Fixes Two Actively Exploited Zero-Days
- The State of Supply Chain Cybersecurity in 2023
- Fortinet Releases Advisory on Critical FortiOS Vulnerability
- Protecting Your Business: 6 Security Practices You Need Right Now
- CISA Warns of Active Exploitation of ZK Java Framework Vulnerability
- Ransomware is Not Going Away — Here’s How to Stay Protected
- Nuspire Q4 2022 and Year in Review Threat Report: Cyber Threat Numbers Make History
- February 2023 Patch Tuesday | Microsoft Fixes 3 Actively Exploited Zero-Days
- ChatGPT in Cybersecurity: Benefits and Risks
- Nuspire Threat Analysis: Qakbot Spam Campaign Leveraging Microsoft OneNote
- Microsoft OneNote Attachments Increasingly Used to Deliver Infostealer RATs
- A Primer on Firewall Policy Management
- Ransomware Operators Target VMware ESXi Servers
- Atlassian Announces Critical Jira Service Management Vulnerability
- IoT Devices the Target of Realtek Jungle SDK Vulnerability
- The Evolution of Data Privacy Laws
- VMware Releases Patches for Critical Vulnerability in vRealize Log Analysis Tool
- What is an SBOM and Why is it Valuable?
- Researchers Warn Against Zoho ManageEngine “Spray and Pray” Attacks
- Cybersecurity: It’s More Than Just Technology – The Human Element Matters Too
- Multiple Global Car Brands Discovered to Have API Vulnerabilities
- Primer on the New DORA Cybersecurity Regulations
- What is DLL Side-Loading?
- What is CISA’s Vulnerability Management Methodology?
- The Matter Standard: Strengthening Smart Home Security
- Citrix ADC and Gateway Zero-Day Under Active Exploitation: What You Need to Know
- Microsoft Reclassifies SPNEGO Extended Negotiation Security Mechanism Vulnerability as Critical: What You Need to Know
- SiriusXM Vulnerability Allows Cyber Criminals to Remotely Unlock and Start Cars: What You Need to Know
- Black Basta Ransomware Group Actively Targeting U.S. Companies: What You Need to Know
- What is Container Security and Why Do You Need It?
- Social Engineering Campaign Targets Auto Dealerships: What You Need to Know
- Passwordless Authentication – Overview, Types, and Challenges
- Nuspire Threat Report Reveals Continued Surge in Q3 2022 Threat Activity
- Examining the Top 5 Automotive Cybersecurity Threats
- November 2022 Patch Tuesday | Microsoft Fixes 6 Actively Exploited Vulnerabilities
- Social Engineering Attacks on New Employees
- ConnectWise Reports Critical Remote Code Execution (RCE) Vulnerability: What You Need to Know
- UPDATE: OpenSSL Releases Security Patch, Downgrades Vulnerability from “Critical” to “High”
- Email Defenses: Are They Enough to Stop Phishing Attacks?
- OpenSSL, Used by Majority of HTTPS Websites, Pre-Announces Critical Vulnerability Patch
- Selling an Increase in Cybersecurity Spending to Your Board
- MFA Fatigue: What It Is and Ways to Mitigate It
- FTC Safeguards Rule: What You Need to Know
- Cybersecurity Issues in Healthcare: Recent Trends and Solution
- Training & Awareness: A Difference-Maker in Cybersecurity
- Why SMBs Should Explore MDR
- Fortinet Announces Critical Bypass Vulnerability: What You Need to Know
- The FBI, CISA and MS-ISAC on Ransomware in School Districts: What’s Happening and How to Respond
- Threat Actors Exploiting On-Premises Microsoft Exchange Zero-Day Vulnerabilities: What You Need to Know
- RMISC is Back! A Look Inside 2022’s In-Person Conference
- Top Drivers of Managed Detection and Response
- Five Key Takeaways from the 2022 Channel Futures MSP Summit
- SIM Swapping Attacks – What They Are and How to Protect Yourself
- How Resource Gaps Impact Vulnerability Management Programs
- Threat Actors Exploiting Dormant Accounts to Bypass MFA: What You Need to Know
- Study Reveals CISOs’ Top Cybersecurity Concerns and Purchasing Priorities
- Cybersecurity Threats and Mobile Banking/Crypto
- Transport Layer Security
- Internet Tracking and How to Safeguard Your Privacy
- What is Privileged Access Management?
- Nuspire Sees Dramatic Uptick in Q2 2022 Threat Activity
- Cybersecurity Predictions for the Rest of 2022
- Why Channel Partners Should Offer Cybersecurity Solutions
- VMware Auth Bypass Vulnerability: What You Need to Know
- A Look Inside the LockBit Ransomware Gang
- Cybersecurity in the Food and Beverage Industry: Risks and Recommendations
- Digital Twins in Cybersecurity: Reducing Industry 4.0 Risks
- Is API Security Effective Enough?
- CISA Urges Switch to Microsoft Exchange Online Modern Authentication: What You Need to Know
- Quantum Computing in Cybersecurity: Threatening or Transformative?
- Risk Assessments Aren’t Enough – Why You Need Threat Modeling
- Stalkerware: A Growing Threat to Individual Security?
- Cyber Attackers’ Favorite Access Points to Exploit
- QR Code Phishing: A New Threat?
- What is Adaptive Security? Definition, Benefits and Best Practices for Your Organization
- Microsoft Office Zero-Day Vulnerability: What You Need to Know
- Steps to Establish an Effective Zero Trust Framework
- MSP vs MSSP: Understanding the Differences
- Outsourcing Security Operations – Is it Worth it?
- Steganography in Cybersecurity: A Growing Attack Vector
- Nuspire’s Q1 2022 Threat Data Show Resurgence in Older Attack Methods
- Confidential Computing: A Revolution in Sensitive Data Security
- MDR and XDR: Detection and Response Options That Work Better Together
- U.S. Passes New Cybersecurity Law for Critical Infrastructure Reporting
- Top Questions from CISOs on Cyber Insurance
- FTC Safeguards Rule: What Auto Dealers Need to Know
- Analyzing the 7 Cyber Kill Chain Steps
- Nuspire Recognized in the 2022 Gartner® Market Guide for Managed Security Services
- What is Conversation Hijacking? Exploring This Emerging Form of Phishing
- Combatting Alert Fatigue in Cybersecurity
- Our Top 3 Tips to Securing Home Networks
- A Beginner’s Guide to SOCaaS
- Spring4Shell Zero-Day Attack: What You Need to Know
- Proven Strategies to Attract and Retain Diverse Cybersecurity Talent
- Sophos Firewall Remote Code Execution Vulnerability: What You Need to Know
- Google Chrome Zero-Day Attack: What You Need to Know
- Okta Breach: What You Need to Know
- Web 3.0 and its Cybersecurity Implications
- A Look Inside the Careers of Four Women in Cybersecurity
- What is Cyber Insurance? Here’s Everything You Need to Know
- The 5 Key Elements to Include in Your Incident Response Plan
- Top Threats to U.S. Organizations from Russian Assets
- The 5 Critical Cybersecurity Steps Construction Companies Should Be Taking
- A Primer on Healthcare Cybersecurity in 2022
- Russian Cyberattacks Against Ukrainian Assets: What You Need to Know
- Key Threat Findings for Q4 and Full-Year 2021
- The Current State of IoT Security
- The Top 3 Mistakes CISOs Make – and How to Fix Them
- Smishing and Vishing: Exploring These Two Phishing Variants
- Five Cybersecurity Challenges an MSSP Can Address
- Ransomware is Here to Stay: How to Defend Against It
- Cybersecurity Predictions: What to Expect in 2022
- A Day in the Life of a Threat Hunter at Nuspire
- BYOD and WFH: Securing Your Business in 2022
- Four Steps Manufacturers Can Take to Build a Robust Security Program
- What to Look for in an MSSP – Our Top 10 Tips, Plus Free Downloadable Checklist
- Latest Updates on The Log4Shell Exploit
- How to Address the Ongoing Cybersecurity Talent Shortage
- Happy Holidays from Your Team at Nuspire – Plus 5 Ways to Stay Safe This Holiday Season
- Security Technology Trends from a CSO and CTO’s Perspective
- Reviewing 2021’s Biggest Ransomware Attacks
- Apache Log4j Zero-day Vulnerability: What You Need to Know
- The top security threats and what you need to do today to prevent them
- Security in Action Framework – The Best Way to Work with an MSSP
- CISO-centric Security Trends and Lessons from 2021
- Tips to Clear Up Confusion Around Incident Response Services, Claims and Offers
- BLOG: 7 Steps to Automate Your SOC
- What Are We Learning from 2021 Ransomware Attacks?
- How to Harden Your Workforce Against Phishing Attacks
- Why we need an industry-focused approach to cybersecurity
- What can we learn from our online enemies?
- Building a Multi-layered Cybersecurity Defense
- Endpoint Detection and Response: To DIY or Not to DIY?
- DIY vs MSSP: Which is Right for You?
- Struggling with cyber insurance? Here’s how an MSSP can help
- Threat Brief – Security Alert – Kaseya Update to Post on 07/07/2021
- Threat Brief – Security Alert – Fortinet – UPDATE from Friday, July 23rd
- The Kaseya Cyberattack and What you Need to Know
- 6 Steps to Make Every Dollar Spent on Your Cybersecurity Program Count
- Cybersecurity Maturity Model Certification (CMMC): 5 Tips for Successful Compliance
- How to Prepare for and Prevent a Ransomware Attack
- Fighting the Good Fight with FireEye
- Threat Actors Zero in on Education and U.S. Elections
- Why Every Cybersecurity Program Should Include Threat Hunting
- How Manufacturers Can Reduce IT and OT Security Risk
- 5 Ways to Protect Your Credit Union from Top Threats
- The 2020 U.S. Election and Phishing Attacks: Don’t Take the Bait
- 10 Qualities to Look For in a Managed Security Service Provider
- How to Prepare, Respond and Recover from a Ransomware Attack
- Accelerate Detection and Remediation with Endpoint Detection and Response
- A Pre- and Post IPO Cybersecurity Readiness Checklist
- Q2 Threat Landscape Report: Securing New Threat Vectors in Virtual Organizations
- TrueFighter: Remote Desktop Protocol Accounts Compromised
- 3 Best Practices to Modernize Your Vulnerability Management Program
- Why CISO’s Got Caught by the Pandemic
- Business Continuity Planning Best Practices
- CFO – Build the Relationship, Establish Trust & Show Progress
- Phishing Threats increase with COVID 19 Outbreak
- Why VPN Security Is Crucial for Remote Work
- Help Your Staff Securely Shift to Remote Work
- CISA Releases Advisory Regarding Enterprise VPN Security
- Newsjacking and Ransomware
- Sora; The IoT Botnet King
- Patching Exploits
- Understanding Critical Functional Areas When Selecting an MSSP
- Ryuk Ransomware
- Ransomware and the Manufacturing Industry
- Cybersecurity Risks of Remote Workers
- OT Malware and Meeting the Security Challenge
- OpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247)
- Implications of the Windows 7 End of Life
- Biggest Cyber Attacks of the Decade
- What is Phishing?
- Impact of Ransomware on Business Operations
- How Cybercriminals Use MSPs to Push Malware
- The Next Generation of Endpoint Security
- What size MSSP is right for you?
- What does the “R” in MDR really mean?
- Boost in TrickBot Malware
- Q3 threat report summary infographic
- What you need to know about BlueKeep
- Ransomware Attacks- How to Detect and Prevent Them
- 5 Cybersecurity Myths Debunked
- What is an endpoint protection platform (EPP)?
- What is Managed SIEM-As-A-Service?
- What is Managed Detection and Response (MDR)?
- What healthcare organizations need to know about HIPAA and cybersecurity
- Top 4 Construction Technologies That Are Changing Network Security
- The Return of Emotet
- What is an MSSP and why do I need one?
- 5 Cybersecurity Best Practices for Construction
- Simple Steps to Secure Today’s Construction IT Technology
- How the Construction Technology Landscape is Changing
- What security threats are targeting IoMT devices (and how to prevent being hacked)
- Top 3 cyber threats targeting manufacturers
- Quarterly Threat Report Summary
- Managing IIoT Security Risks
- Monitoring the Manufacturing Floor
- Benefits of MSSP Mergers
- Why It’s Important for Manufacturers to Segment OT and IT Networks
- Benefits of Regularly Scheduled Security Reviews
- Your Firewall Isn’t Blocking Everything. Here’s What You Need To Do…
- Six Tips to Mitigate Cyber Threats In The Workplace
- Key Features Needed in a SIEM Solution
- A Brief History of Malicious Threats | Infographic
- Bridging the IT Talent Gap With A Managed Security Service Provider
Events
- AI in Action: Practical Use Cases to Shift Cybersecurity from Reactive to Proactive
- Join Nuspire in Raleigh at Triangle InfoSeCon
- Cyber Threat Report: Q3 2024 Data Analysis
- Join Nuspire at the Cyber Security Summit in Minneapolis
- Join Nuspire at CISO XC
- Intelligent Unification: Introducing Nuspire's AI-Powered Cybersecurity Experience
- [Insider Preview] Intelligent Unification: Introducing Nuspire's AI-Powered Cybersecurity Experience
- Join Nuspire at Three Rivers Information Security Symposium
- Join Nuspire at InfoSec World
- AI-Enhanced Cybersecurity: Bridging Art, Science, and Strategic Defense
- Join Nuspire at GrrCon Cybersecurity Summit and Hacker Conference
- Cyber Threat Report: Q2 2024 Data Analysis
- Join Nuspire at FutureCon Pittsburgh Cybersecurity Conference
- Securing the Unseen: A Hacker’s Take on the Necessity of Dark Web Monitoring
- Join Nuspire at RMISC in Denver
- Join Nuspire at Data Connectors Boston Cybersecurity Conference
- When the Wheels Come Off: Bringing Order to Cyber Incident Chaos
- Cyber Threat Report: Q1 2024 Data Analysis
- Join Nuspire at NolaCon
- Cuppa SecuriTEA
- Join Nuspire at Data Connectors Atlanta Cybersecurity Conference
- The MITRE Touch: Practical Strategies for Mapping Device Logs to MITRE ATT&CK
- Join Nuspire at Data Connectors Raleigh Cybersecurity Conference
- Scattered, Smothered and Covered in Cyber: The Sequel
- Join Nuspire at Data Connectors Austin Cybersecurity Conference
- Join Nuspire at BSidesROC 2024!
- Join Nuspire at the Baltimore Cybersecurity Conference on Pi Day
- MDR Done Right: Smashing Through Buzzwords and Checkbox Mentality
- Join Nuspire and 360 Advanced at CISO XC!
- Cyber Threat Report: Q4 and Full-Year 2023 Data Analysis
- Join Nuspire at the Jacksonville Cyber Security Summit!
- Into the Future: Cybersecurity Forecast 2024
- Join Nuspire at the Qualys Security Conference!
- Join Nuspire at the Boston Cybersecurity Conference!
- Cyber Threat Report: Q3 2023 Data Analysis
- Automotive Dealer Security: Navigating Incident and Breach Response
- Whiskey, Watches and Work
- Join Nuspire at Triangle InfoSeCon in Raleigh!
- Cybersecurity Synergy: Safeguarding Human Capital in the Digital Age
- Join Nuspire at Three Rivers InfoSec Symposium in Pittsburgh!
- Join Nuspire at Data Connectors St. Louis!
- Offensive vs. Defensive Security: Cyber Stories from the Field
- Join Nuspire at BSides Columbus!
- Cyber Threat Report: Q2 2023 Data Analysis
- How to Transform Patch Management without Rip and Replace
- How to Avoid Common Firewall Misconfigurations: The Human Error
- Join Nuspire at BSides Pittsburgh!
- Denver Cyber Happy Hour
- Join Nuspire in Denver at the Rocky Mountain InfoSec Conference 2023
- Cyber Threat Report: Q1 2023 Data Analysis
- Join Nuspire at HackMiami X
- Join Nuspire at the Cyber Security Summit in Dallas
- Practical Tips to Optimize Your Security Technology Stack: Make Every Dollar Count
- Central Ohio ISSA InfoSec Summit
- Hybrid Hunting: Threat Hunting in the Managed Security Battlespace
- Steps to Building a Successful Security Operations Center (SOC)
- Threat Report Findings: Q4 2022 and Year-in-Review
- 2023 Cybersecurity Predictions: Are You Ready?
- Threat Hunting: The Anatomy of a Cyber Threat Hunt
- Threat Report Findings: Q3 2022
- FTC Safeguards Rule: What Auto Dealers Need to Know
- Top 5 Drivers of Managed Detection and Response Adoption, Featuring IDC
- Nuspire Annual Study: Top 10 CISO Buying Trends of 2022
- Threat Report Findings: Q2 2022
- Addressing the Third-Party Cybersecurity Conundrum
- Threat Report Findings: Q1 2022
- Webinar: Cybersecurity Predictions: What to Expect in 2022
- Webinar: Security Technology Trends from a CSO and CTO’s Perspective
- Q3 2021 Threat Report Sneak Peek Webinar
- CISO Security Trends and Lessons from 2021
- Webinar: Learning from 2021 Ransomware Attacks
- Q2 2021 Threat Report Findings Webinar
- Q1 2021 Threat Report Findings Webinar
- Before You Spend Another Cybersecurity Dollar, Make It Count
- How to Beat Threat Actors at Their Own Game
- The Cybersecurity Revolution Starts Here
- Defending the Castle: Building a Multi-layered Cybersecurity Defense
- 3 Steps to Incident Readiness
- The Enemy Gets a Vote: Why Threat Modeling and Awareness Matters to a CISO
- Understanding the Equation: How Next Gen MSS + MDR = Full Threat Protection
- Know Your Enemy: The Power of an Industry-approach Threat Model Live Webinar
- How to Build Your Incident Response Plan - Cyberattack Remediation Strategies
- The Greatest Cybersecurity Threats by Industry
- Q3 2020 Threat Report Findings Webinar
- When and How to Apply Third-Party Intelligence
- CISOs on the Frontline Webinar Series
- How to Tailor Your Security Program to Your Industry
- Top CISO Mistakes (and How to Avoid Them)
- Q2 2020 Threat Report Findings
Team
- Lewie Dunsworth
- J.R. Cunningham
- Brian Lamberger
- Michael Wilson
- Chris Boehnlein
- Emily Burke
- Steve Drohan
Press Releases
- Nuspire’s Q3 2024 Threat Report Shows 50% Spike in Exploit Attempts and Rise in Ransomware Extortion Activity
- Nuspire Named One of Nation’s Best and Brightest Companies to Work For in 2024
- Nuspire Ranked Among Elite Managed Service Providers on Channel Futures 2024 Next Generation List
- Nuspire's Q2 2024 Threat Report Reveals Surge in Exploit Activity and Shifts in Ransomware Landscape
- Nuspire Ranked 19th on Channel Futures 2024 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide
- Cybersecurity Leaders Join Forces in Protecting Businesses from Growing Threats as PDI Technologies Acquires Nuspire
- Nuspire Named One of the Best and Brightest Companies to Work For in 2024
- Nuspire Wins 2024 Fortress Cybersecurity Award from Business Intelligence Group
- Nuspire Launches Innovative Incident Response Readiness Service to Enhance Cyber Resilience
- Nuspire Welcomes Technology Veteran Brian Lamberger as Chief Revenue Officer
- Nuspire Completes SOC 2 Audit with Zero Findings
- Nuspire Recognized as "Best MSSP" by the Cybersecurity Excellence Awards
- Nuspire's Q1 2024 Threat Report Exposes Dark Web and Ransomware Surge
- Nuspire Welcomes Chris Roberts as Their Chief Strategy Executive & Evangelist
- Nuspire Enhances Managed Security Offerings with Dark Web Monitoring Integration
- Nuspire Recognized on CRN’s 2024 MSP 500 List
- Botnets Evolve as Malware Increases and Exploits Skyrocket in 2023
- Botnet Activity Surges in Q3 2023
- Ransomware Takes Center Stage in Q2 2023
- Nuspire Continues Streak as One of the Best and Brightest Companies to Work For in the Nation
- CISOs Plan to Increase Cybersecurity Spending Despite Economic Concerns, Study Says
- Exploits, Botnets and Malware Spike in Q1 2023
- Nuspire Teams with Qualys to Offer Comprehensive Security Services Across North America
- FireMon and Nuspire Collaborate to Eliminate Complexity of Firewall Policy Management
- Nuspire CEO, Lewie Dunsworth, Named to CDO Magazine’s Leading MSSP List for 2023
- Nuspire Introduces Managed Microsoft Defender Solution
- Frost & Sullivan Recognizes Nuspire as Leader in Growth and Innovation for Managed and Professional Services
- Report Reveals Record-Breaking Year for Cyber Threats
- Digital Transformation is Done
- Latest Threat Report Shows Sustained Spike in Cyber Threat Activity in Q3
- Nuspire Recognized as a 2022 ‘Best and Brightest Companies to Work for’ in Denver and Detroit
- Nuspire Launches Enhanced Partner Program to Expand Availability of Managed Cybersecurity Services
- Nuspire Hires MSSP Strategist Pete Shah as Chief Revenue Officer
- New Study Reveals CISOs are Most Likely to Outsource Security Program Improvements and 24/7 Protection
- Threat Report Shows Dramatic Uptick in Threat Activity with Exploits Growing Nearly 150%
- CRN Recognizes Nuspire on 2022 Solution Provider 500 List
- Use of Malware, Botnets and Exploits Expands in Q1 2022; Mirai Sees Resurgence
- Michelle Bank from Nuspire Named on CRN’s 2022 Women of the Channel Power 70 Solution Providers List
- Nuspire Named in the 2022 Gartner® Market Guide for Managed Security Services
- Security Experts Discover Significant Increase in Emotet Activity in Q4 2021
- Nuspire Recognized as a ‘Best and Brightest Companies to Work for in the Nation’ for Sixth Year
- Nuspire Security Experts Witnessed Significant Increase in Exploit Activity with Two New Vulnerabilities in Q3
- Security Experts Witnessed a 55,239% Increase in Ransomware Activity in Q2
- Nuspire Launches New Managed Endpoint Detection and Response (EDR) Service That Supports Leading EDR Technology Providers Including Carbon Black, SentinelOne and Others
- Nuspire Expands Global Capabilities with an International Security Operations Center (SOC)
- Security experts discover a 1,500%+ increase in attacks against VPN due to remote work
- Nuspire Appoints J.R. Cunningham to Chief Security Officer
- Nuspire Revolutionizes the Security Industry Experience with the Release of myNuspire
- Nuspire, Fortinet, and Leading Analyst Firm to Discuss Latest Managed Security Service Providers and Managed Detection and Response Market Convergence Research
- Nuspire Appoints Three C-Suite Executives Amid Company Growth
- Malware and Exploit Activity are up by more than 57% according to latest Nuspire Threat Report
- Nuspire Launches New Industry-Based Approach to Threat Modeling
- Nuspire Recognized as a ‘Best and Brightest Companies To Work For in The Nation’ For Fifth Year
- Security Experts Discover Threat Actors Becoming More Ruthless with the Resurgence of Emotet
- Nuspire Delivers Advanced Threat Intelligence through Partnership with Recorded Future
- Nuspire Named a Best and Brightest Companies to Work for in Metro Detroit
- Nuspire Named to MSSP Alert’s Top 250 MSSPs List for 2020
- Nuspire and SentinelOne Enhance Endpoint Service to Help Clients Improve Their SecOps Efficiencies and Effectiveness
- Nuspire Reveals a Shift in Attack Methods with an Exponential Increase of Botnet and Exploit activity
- Nuspire Recognized As A Contender By Leading Industry Analyst Firm
- Nuspire Report Pinpoints Changes in Adversarial Cyber Activity Capitalizing on Coronavirus Pandemicess Release
- Nuspire Recognized on CRN’s 2020 MSP500 List for Fourth Consecutive Year
- Nuspire Recognized as a 'Best and Brightest Companies To Work For in The Nation' For Fourth Year
- Nuspire Report: Cyberattackers Took a Holiday in Preparation for 2020
- Nuspire Hires Lewie Dunsworth As New CEO
- Nuspire Security Researchers Discover 730% Increase in Emotet Activity
- Nuspire Expands Managed Endpoint Service
- Nuspire Named to 2019 MSSP Alert Top 200 Managed Security Services Providers List
- Inc. Magazine Unveils Its Annual List of America’s Fastest-Growing Private Companies—the Inc. 5000
- Security Researchers Discover Massive Trend in Phishing Scams Targeting Businesses
- Nuspire's Security Researchers Discover Uptick in Double Pulsar Backdoor Attacks Targeting Mid-Sized Businesses
- Nuspire Announces Merger with Colorado-based MSSP GBprotect
- Nuspire Networks Recognized for Excellence in Managed IT Services For Second Consecutive Year
- Nuspire Networks Named Winner in the 15th Annual Info Security PG's 2019 Global Excellence Awards
- Nuspire Donates to Philadelphia Society for Information Management Foundation (PHISIM)
- Nuspire Networks Celebrates 20 Year Anniversary
- Nuspire Networks Recognized As A 'Best and Brightest Companies to Work For in The Nation' For Third Year
- Nuspire Hires Greg Yarrington As Chief Operating Officer
- Nuspire Launches Managed Detection and Response (MDR) Solution with Three Detection and Response Services
- CDK Global and Nuspire Networks Safeguard Automotive Dealerships with new Network Protect Solution
- Joseph Breen Joins Nuspire as Chief Revenue Officer
- Nuspire Promotes Dan Hoban to CSO
- Nuspire Aligns With TeamLogic IT to Provide Network Security Services
- Nuspire Networks Named to 2018 CRN Fast Growth 150 List
- Nuspire Networks Receives Corp! Magazine's Economic Bright Spots Award
- Nuspire Networks Named as Finalist in the 2018 SC Awards Europe
- Nuspire Networks Named to CRN’s 2018 Solution Provider 500 List
- Nuspire Networks Hires Ken Carson as Chief Financial Officer
- Nuspire Networks Featured in CRN’s 2018 Partner Program Guide
- Nuspire Networks Recognized for Excellence in Managed IT Services
- Nuspire Networks' Services Named Bronze Winners of the 2018 Cybersecurity Excellence Awards
Media Coverages
- What Comes After the Digital Transformation?
- Cars and Connectivity: Perfect Pair or Additional Attack Vectors?
- What Is an SOC Analyst?
- Nuspire Introduces Managed Microsoft Defender Solution
- Managed Security Service Provider (MSSP) Market News: 16 March 2023
- Convenience vs. security: The risk of connected vehicles
- Are your IoT devices at risk? Cybersecurity concerns for 2023
- Right-to-Repair Legislation Presented in U.S. House
- Nuspire Reveals a Shift in Attack Methods with an Exponential Increase of Botnet and Exploit Activity
- Nuspire says more than 26 million exploit attacks in Q2 2020
- New attack vectors make securing virtual companies even more challenging
- Remove a pillar of their strategy
- Study reveals shift in attack methods with an exponential increase of botnet and exploit activity
- Report: Cyberthreats Continue as Workers Stay Home
- Nuspire Reveals A Shift In Attack Methods With An Exponential Increase Of Botnet And Exploit Activity
- How far feds have come on election security goals since the last election
- Botnet and exploit activity increases as attackers shift tactics
- Security threats have already moved on from COVID-19-themed attacks, report finds
- Nuspire Recognized As A Contender By Leading Industry Analyst Firm
- How one attack campaign steals and sells RDP credentials
- Findings: The Forrester Wave: Midsize Managed Security Services Providers, Q3 2020
- Promo.com Data Breach Exposes Gaps in Third-Party Risk Management, Yet Again!
- 5 charts that show the impact, and cost, of data breaches
- Cisco patches severe traversal vulnerability exploited in wild
- Hackers Accessed, Downloaded Twitter User Data in Recent Attack
- Report: Cybersecurity Threats Rise as Working from Home Increases Due to COVID-19
- Changing Requirements and Security Concerns During COVID-19
- How do I select a network detection and response solution for my business?
- How do I select a network detection and response solution for my business?
- Goodbye 100-day Cyber Threats, Metro Detroit Firm IDs and Blocks Breaches in 15 Minutes
- MSSP Nuspire Launches HALO for Network Security, Incident Response
- Banking trojan resurfaces targeting JPMorgan, Capital One
- Manufacturers, service providers primary targets of Q1 ransomware incidents
- Athenahealth launches new EHR-embedded telehealth tool
- Honda Hacked: Japanese Car Giant Confirms Cyber Attack On Global Operations
- The potential security crisis presented by rapid telehealth rollouts
- Ransomware operators auction stolen data on dark web
- IoT: With great convenience comes even greater risk
- Microsoft open-sources its coronavirus threat data for security researchers
- How to protect your organization against the latest malware threats
- Wed May 13 2020: Security post-pandemic, Facebook settles, and is Twitter never going back!
- Research Finds Changes in Adversarial Cyber Activity
- Phishers Start to Exploit Oil Industry Amid COVID-19 Woes
- Why Many CISOs Got Caught by the COVID-19 Pandemic
- Hundreds of cybersecurity experts team up to battle coronavirus-related hacks
- How hackers are exploiting the coronavirus – and how to protect yourself
- Hospitals under threat as hackers exploit coronavirus to carry out cyber attacks
- The 12 Best Network Detection and Response Solutions for 2020
- Cyberattackers decreased their activity at the end of 2019, but only to change tactics
- How to defend your organization against the latest malware, botnets and security exploits
- Commerce Charter Township’s Nuspire Announces Lewie Dunsworth as CEO
- Retailers Prime Targets for data theft
- Lewie Dunsworth named CEO at Nuspire in Commerce Township
- New CEO Of MSSP Nuspire To Double Down On Cloud, Self-Service
- Nuspire Hires Lewie Dunsworth As New CEO
- Commerce Township Based Nuspire Replaces Founder CEO
- MSSP Nuspire Appoints Former Herjavec Group, Optiv Exec as CEO
- Michigan Security Company Identifies ‘Emotet’ As Top Threat
- Nuspire Security Researchers Discover 730% Increase in Emotet Activity
- Researchers discover massive increase in Emotet activity
- Nuspire Security Researchers Discover 730% Increase in Emotet Activity
- Under Attack
- IT in the D
- Nuspire upgrades its Managed Endpoint service that leverages SentinelOne’s endpoint technology
- Nuspire Expands Managed Endpoint Service
- Nuspire Expands Managed Endpoint Service
- Nuspire Expands Managed Endpoint Service
- Security Researchers Discover Massive Trend in Phishing Scams
- PDF Phishing Scams Rise Nearly 200%
- Cybersecurity Risks and How to Minimize Them In the Digital Age
- Nuspire Networks acquires Colorado security services company
- Nuspire Announces Merger with GBprotect
- Digital Security Provider Nuspire in Commerce Township to Acquire Colorado’s GBprotect
- MSSP Merger: Nuspire Acquires GBprotect
- MSSP Nuspire Adds Consulting With GBprotect Buy
- Nuspire launches MDR solution with three detection and response services
- Commerce Township network security service provider adds COO
- MSSP Nuspire Launches MDR Solution, Threat Response Services
- MSSP Nuspire Launches MDR Solution, Threat Response Services
- Nuspire Launches Managed Detection And Response Solution With Three Detection And Response Services
- Nuspire Launches MDR Solution
- Nuspire of Commerce Township names Joseph Breen as chief revenue officer
- Nuspire Hires Joseph Breen as Chief Revenue Officer
- Joseph Breen Joins Nuspire as Chief Revenue Officer
- Nuspire Promotes Dan Hoban to Chief Strategy Officer
- Managed Security Services Provider (MSSP) News: 28 November 2018
- Nuspire Aligns with TeamLogic IT to Provide Network Security Services
- Protecting Your Personal Information Online
- Nuspire CyberSecurity Services – Helping Your Business Spot Online Threats
- Educate your employees and dedicate security staff to protect your franchise from email threats
- Top 5 Email Security Threats
- CDK Global partners with Nuspire
- CDK Global partners to offer new 24/7 cybersecurity solution for dealerships
- Solutions for Today’s Retail Network and Security Challenges
- 10 questions DevOps engineers can expect to be asked in a job interview
- Your franchise could be breached and you might not even know it. What can you do about it?
- Corp! highlights area’s Economic Bright Spots winners
- Top 5 Security events of 2018
- Senior Security Sales Engineer
- ‘Most Valuable’ awards showcases the very best in a growing economy
- Managed Security Service Provider Nuspire Hires New CFO
- Commerce Township-based Nuspire names Ken Carson as CFO
- Franchisees are a popular target for hackers. Here are steps you can take to thwart an attack
- How to improve your security infrastructure when you’re on a budget
- Five Ways to Improve Enterprise Email Security
- Browser-Based Cyrptocurrency Miners
- Episode 235: Foster Braun, Internet Advisor Turns 20, Nuspire, Merit Networks
- 3 Types of Digital Threats to Look Out for at the 2018 Winter Olympics
- 10 ways AI will impact the enterprise in 2018
Security Alerts
- CISA releases emergency directive regarding active exploitation of SolarWinds Software
- Critical Vulnerability reported on GE Healthcare Imaging and Ultrasound products
- NSA Advisory Indicates Russian Threat Actors are Exploiting VMWare Vulnerability
- Two Healthcare providers fall victim to data breaches
- Threat Actor posts exploits for over 49,000 vulnerable Fortinet devices
- Holiday Shopping Phishing Campaigns on the rise
- Google Drive Notifications abused in new phishing campaign
- At Least 12 Hospitals and Healthcare Agencies targeted in coordinated ransomware attack
- New Google Chrome Patch fixes actively exploited Zero-Day
- Egregor Ransomware Samples Shared on Twitter
- Maintenance Window
- A new SATNews story has been added to the feed
- Windows Error Service Abused in Fileless Malware Attacks
- Paste.nrecom[.]net used in multiple phishing campaigns
- 'bishik77' Selling Access to Network of US Car Dealership
- New Mimikatz Update Adds Exploit for ZeroLogon (CVE-2020-1472) Shared on GitHub
- CISA Releases Emergency Directive on Microsoft Windows Netlogon Remote Protocol (Zerologon)
- CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability PoCs released
- TA505 Threat Group Targets Multiple Industries Worldwide
- Internet Backbone Outage
- New Emotet Campaign Uses COVID-19 Lures to Target US Organizations
- New Microsoft Vulnerabilities announced - 17 critical
- Phishing Campaign Targets Executives Office 365 Accounts
- More Than 900 Pulse Secure VPN Sensitive Information being Advertised on an Underground Forum
- Facebook Plugin Vulnerability Could Allow Threat Actors to Hijack WordPress Websites Chat
- Twitter Hack was started by phone based spear-phishing
- New “BootHole” Vulnerability Leaves Linux and Windows Systems At Risk
- High-Severity Dell PowerEdge Server Flaw Disclosed
- Promo Data Breach Exposes More Than 14 Million User Accounts
- Cisco patches actively exploited ASA/FTD firewall vulnerability
- Google Drive Features a Vulnerability That Could Allow Threat Actors to Distribute Malicious Files
- Emotet Trojan Spreads QakBot Malware via Spam Campaign
- New FritzFrog Botnet Attacks Millions of SSH Servers
- After Period of Inactivity, Emotet Trojan Returns to Target Users Globally
- July 2020 Microsoft Patch Tuesday Includes 123 Vulnerabilities, 32 Allow for Remote Code Execution
- APT Group “Evilnum” Targets Financial Technology Companies
- Palo Alto Networks Discloses Critical Vulnerability CVE-2020-2021 in Firewall OS
- New “Lucifer” Malware Observed Exploiting Multiple Vulnerabilities to Infect Windows Devices
- New Thanos Ransomware Campaign Targeted European Countries
- Four Zero-Days Attacks Identified Targeting Industrial Control Systems Honeypot
- New Black Kingdom Ransomware Exploits Pulse Secure VPN Flaw to Target Enterprise Networks
- FBI Warns that Cybercriminals are Increasingly Targeting Mobile Banking Apps
- Honda Investigates Network Outage Due to Possible Ransomware Attack
- Avaddon Ransomware Launches a Massive Global Spam Campaign
- REvil Ransomware Group Start Auction Site to Sell Stolen Data
- Cisco Discloses Critical Vulnerabilities within the SaltStack Framework
- Two dozen databases being sold after attacks
- Two new massive COVID-19 phishing campaigns identified
- Thunderbolt Vulnerability affects all devices manufactured 2019 and earlier
- APT Groups Targeting Healthcare and Essential Services
- Sophos XG Firewall Zero-Day Hotfixed
- Agent Tesla used against Oil and Gas Industry in Spear-phishing campaign
- Google witnessed over 18 Million daily COVID Themed phishing emails
- New Microsoft Patch fixes two actively exploited Zero-Days
- Targeted Phishing Campaigns against Zoom Meetings
- Marriott International suffers data leak exposing estimated 5.2 million guest's information
- Coronavirus ‘Tracking App’ targets Android Users with Ransomware
- OpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247)
- Threat Actors Targeting Automotive Industry
- Discord Turned into an Info-Stealing Backdoor
- DoorDash data breach affects 4.9 million customers, workers and merchants
- Smominru Botnet
- Hackers Remotely Steal Data From Intel CPUs
- Zoom Vulnerability Allows Attackers To Enable Webcam and Perform DoS
- DealerBuilt Dealership Software Provider Reaches Breach Settlement
- Microsoft 0-Day Vulnerabilities
- Google reveals G Suite users' passwords have been stored in plaintext
- WhatsApp 0-Day Installing Spyware on Phones
- Critical RDP Vulnerability
- Dell Pre-Installed Software Could Lead to Remote Attacks
- Backdoor Targeting US Companies Through LinkedIn Messaging
- 19 Year Old WinRAR Vulnerability Disclosed
- FaceTime Bug Lets Callers See and Hear You
- Microsoft Exchange 2013 and Newer Vulnerable to NTLM Relay Attacks
- Remote Access Vulnerability in Cisco Small Business Switches
- Unprotected VOIP Server Exposes Millions of Call Logs and SMS Messages
- Hackers Using Zero-Width Spaces to Bypass Office 365
- New Year Security Reminder
- Spam Bomb Threat Demanding Bitcoin Ransom Payments
- Starwood Hotels Massive Database Breach Affecting 500 Million Guests
- Critical Vulnerabilities found in Cisco, Meraki, and Aruba devices
- How to Choose the Right Managed Security Service Provider (MSSP) for Your Organization
- New Windows Zero-Day exploit released
- Facebook receives order from the Government of Japan to Improve Data Protection
- Minnesota Department of Health falls prey to phishing attack
- One in Ten Emails Verified as Malicious
- WhatsApp Video Call Attack
- Google shutting down Google+
- Facebook vulnerability affects up to 90 million users
- Cloudflare Launches Encrypted SNI Support
- Newegg customer data exposed in breach
- Widespread MikroTik Router Exploit Campaign
- Fortnite Vulnerability Demonstrates Fears of Self-Distribution of Apps
- Apache Struts Remote Code Execution Vulnerability
- ATM cash-out
- WPA/WPA2 PSK Vulnerability
- Extortion Scam Circulating via Email
- Stolen D-Link Certificates Used By Malware
- New Malware Decides either Cryptominer or Ransomware
- Premature Exploitation: Unarmed zero-day uploaded to VirusTotal
- Wavethrough Vulnerability
- Remote Code Execution Flaw Found in IBM QRadar
- Meltdown & Spectre Vulnerabilities
- Critical Vulnerability Exposes Drupal Websites
- Cryptocurrency Miner Attempts to Infect Over 500,000 PCs
- macOS 0-Day Kernel Flaw
- Cisco VPN & WannaMine Vulnerabilities
- Cisco ASA SSL VPN Vulnerability
- FortiClient Exposes VPN Credentials
- 1.4 Billion Plain-Text Passwords Leaked on Dark Web
- Keylogger Found in Driver Software for HP/Compaq/Windows Notebook Computers
- Cross-platform backdoor DropboxCache found affecting Linux and Windows machines
- CryptoWall 4.0
Resources
- [On-Demand] Cyber Threat Report: Q3 2024 Data Analysis
- Q3 2024 Cyber Threat Report
- Guide: The Power of AI in Cybersecurity: 5 Key Use Cases
- Checklist: Best Practices for Responsible AI Use in Cybersecurity – Build Trust and Protect Data
- Checklist: Evaluating AI-Augmented Cybersecurity Service Providers – Find the Right AI-Powered Partner
- [On-Demand] Intelligent Unification: Introducing Nuspire’s AI-Powered Cybersecurity Experience.
- eBook: The AI-Augmented Security Practitioner – Transforming Cyber Defense from Reactive to Predictive
- [On-Demand] AI-Enhanced Cybersecurity: Bridging Art, Science and Strategic Defense
- [On-Demand] Cyber Threat Report: Q2 2024 Data Analysis
- Q2 2024 Cyber Threat Report
- eBook: The Ultimate Incident Response Guide – Your Playbook for Swift and Effective Breach Response
- [On-Demand] Securing the Unseen: A Hacker’s Take on the Necessity of Dark Web Monitoring
- [On-Demand] Part 2 — When the Wheels Come Off: Bringing Order to Cyber Incident Chaos
- Checklist: Strengthen Your Cyber Resilience with This Essential Incident Response Checklist
- [On-Demand] Part 1 - When the Wheels Come Off: Bringing Order to Cyber Incident Chaos
- [On-Demand] Cyber Threat Report: Q1 2024 Data Analysis
- Interactive Report Summary Q1 2024 Cyber Threat Report
- [Video Series] Mapping Cyber Risks with MITRE ATT&CK in MDR: A Series on Crafting Preemptive Defenses
- [Video Series] Peeling Back the Layers of MDR: A Series on Understanding and Choosing Solutions Wisely
- [On-Demand] The MITRE Touch: Practical Strategies for Mapping Device Logs to MITRE ATT&CK
- eBook: Making MDR Work for You: How Security Teams Can Accelerate Outcomes
- MDR Done Right: Smashing Through Buzzwords and Checkbox Mentality
- [On-Demand] Cyber Threat Report: Q4 and Full-Year 2023 Data Analysis
- Interactive Report Summary Q4 and Full-Year 2023 Cyber Threat Report
- [On-Demand] Into the Future: Cybersecurity Forecast 2024
- [On-Demand] Cyber Threat Report: Q3 2023 Data Analysis
- Q3 2023 Cyber Threat Report
- eBook: Harmonizing Cybersecurity Tools: A Guide to Tech Stack Optimization
- [On-Demand] Automotive Dealer Security: Navigating Incident and Breach Response
- [On Demand] Cybersecurity Synergy: Safeguarding Human Capital in the Digital Age
- eBook: How Vulnerability Management and Patch Management Work Together in a Proactive Cybersecurity Strategy
- [On-Demand] Offensive vs. Defensive Security: Cyber Stories from the Field
- On-Demand: Cyber Threat Report: Q2 2023 Data Analysis
- Interactive Report Summary: Q2 2023 Cyber Threat Report
- How to Transform Patch Management without Rip and Replace
- [On-Demand] How to Avoid Common Firewall Misconfigurations: The Human Error
- Second Annual CISO Research Report on Challenges and Buying Trends: A Focus on Optimization
- On-Demand: Cyber Threat Report Q1 2023 Data Analysis
- Interactive Report Summary Q1 2023 Cyber Threat Report
- myNuspire: Optimize Your Security Program in One Platform
- On-Demand: Practical Tips to Optimize Your Security Technology Stack Make Every Dollar Count
- How to Optimize Your Security Program Using Security Reviews
- On-Demand: Hybrid Hunting Threat Hunting in the Managed Security Battlespace
- On-Demand: Steps to Building a Successful Security Operations Center (SOC)
- eBook: How to Successfully Convince Your Board of Directors to Fund Your Cybersecurity Priorities
- What Makes Nuspire a Top MSSP? Download the latest Frost RadarTM Analytics Report
- On-Demand: Threat Report Findings Q4 2022 and Year-in-Review
- Q4 2022 and Year in Review Threat Report
- On-Demand: 2023 Cybersecurity Predictions: Are You Ready?
- How to Determine Which Security Services to Outsource
- On Demand: The Anatomy of a Cyber Threat Hunt
- On-Demand: Threat Report Findings Q3 2022 Webinar
- Q3 2022 Threat Report
- White Paper: First Annual CISO Research on Challenges and Buying Trends: A Focus on Prevention
- On-Demand: FTC Safeguards Rule: What Auto Dealers Need to Know
- Buyer’s Guide: 6 Questions to Ask when Evaluating MSSP’s EDR Services
- How MDR Addresses Cybersecurity’s Biggest Challenges
- [On-Demand] Nuspire Annual Study: Top 10 CISO Buying Trends of 2022 Webinar
- Buyer’s Guide: 5 Key Questions for Evaluating vCISO Services
- eBook: A CISO’s Guide to Cyber Insurance
- XDR: What it is and How it Boosts Cybersecurity Defenses
- On-Demand Webinar: Threat Report Findings: Q2 2022
- Q2 2022 Threat Report
- Buyer’s Guide: 6 Questions to Ask When Evaluating an MSSP’s MDR Services
- On-Demand Webinar: Addressing the Third-Party Cybersecurity Conundrum
- The Complete Guide to Finding and Working with an MSSP
- Why Outsourcing Security Operations Makes Good Business Sense
- Buyer’s Guide: 7 Key Questions for Construction Firms to Use When Evaluating Potential MSSPs
- Buyer’s Guide: 7 Key Questions for Manufacturers When Evaluating MSSPs
- Buyer’s Guide: 7 Key Questions for Evaluating Potential MSSPs
- On-Demand: Threat Report Findings: Q1 2022 Webinar
- Q1 2022 Threat Report
- On-Demand Webinar: Top 5 Questions from CISOs on Cyber Insurance
- A Guide to Key Cybersecurity Acronyms
- Infographic: Learn the Latest Info on Medical Device Vulnerabilities
- Infographic: Learn the Latest on Cyberattacks in Manufacturing
- On-Demand Webinar: The Cybersecurity Talent Shortage: Proven Strategies to Attract and Retain Diverse Talent
- Defining Zero Trust, Plus Steps to Establish an Effective Zero Trust Framework
- On-demand Webinar: Threat Report Findings: Q4 and Full-Year 2021
- Q4 and Full-Year 2021 Threat Report
- On-Demand Webinar: Cybersecurity Predictions: What to Expect in 2022
- On-Demand Webinar: Security Technology Trends from a CSO and CTO’s Perspective
- 8 Questions That Cut Through the Lingo of Cybersecurity Incident Response
- Security in Action Framework – the Best Approach to Working with a MSSP
- On-Demand Webinar: CISO-centric Security Trends and Lessons from 2021 featuring Forrester
- Q3 2021 Threat Report
- On-demand webinar: Learning from 2021 Ransomware Attacks
- Forrester: Top Recommendations For Your Security Program, 2021
- On-demand webinar: Q2 2021 Threat Report Findings
- Q2 2021 Threat Report
- Forrester: The Top Security Technology Trends to Watch, 2021
- On-demand webinar: Q1 2021 Threat Report Findings
- Q1 2021 Threat Report
- On-Demand Webinar: Before You Spend Another Cybersecurity Dollar, Make It Count
- On-Demand Webinar: How to Beat Threat Actors at Their Own Game
- On-Demand Webinar: The Cybersecurity Revolution Starts Here - myNuspire
- On-Demand Webinar: Building a Multi-layered Cybersecurity Defense
- On-Demand Webinar: 3 Steps to Incident Readiness
- On-Demand Webinar: Why to Select an MSSP for MDR
- IDC Technology Spotlight: Why Choosing a Provider that Blends MSS and MDR Makes Sense
- 3 Steps to Incident Readiness: Hope for the Best but Prepare for the Worst
- Q4 2020 Threat Report
- Construction Checklist: 5 Steps to Tighten Security
- On-Demand Webinar: Q4 and 2020 Year-in-Review Threat Report Findings
- On-Demand Webinar: How Next Gen MSS + MDR = Full Threat Protection
- 5 Reasons to Fortify Your Cybersecurity Program with Industry-Specific Cyber Threat Modeling
- On-demand Webinar: Know Your Enemy, The Power of an Industry-approach Threat Model
- Cybersecurity Incident Response Plan
- On-demand webinar: How to Build Your Incident Response Plan
- CISO Checklist: How to Avoid Top Mistakes
- 5 Tips to Help you Choose One Service Provider for All of Your Managed Security Needs
- On-Demand Webinar: Q3 Threat Report Findings
- Threat Hunting Checklist
- Nuspire’s Quarterly Threat Landscape Report: Q3 2020
- MDR: The Next Generation of Managed Security Services
- On-Demand Webinar: Advanced Threat Hunting (and Indicators of Compromise)
- On-demand Webinar: Turning 2020 Pain into 2021 Gain
- How are Cyberattackers Evolving Beyond Pandemic-Inspired Threats?
- 5 Cybersecurity Best Practices Credit Unions Can Bank On
- 4-Step Security Checklist Designed for Credit Unions
- A Guide to Interviewing and Selecting an MSSP (Checklist)
- Top 10 Tips for Working with an MSSP (Through the Lens of an Anti-MSSP)
- Cybersecurity Challenges in Healthcare: Infusystem Case Study
- Global Manufacturer Tecomet: Security Monitoring Case Study
- The Biggest Manufacturing Cybersecurity Threats (and How to Prevent Them)
- Top Ways to Shorten Cybersecurity Remediation Cycles
- On-Demand Webinar: Know Your Enemy by Learning the Art of Threat Hunting
- On-Demand Webinar: The Science of Red vs. Blue Team Methodology
- On-Demand Webinar: When to Break Up with Your MSSP and Why
- Nuspire's Quarterly Threat Landscape Report: Q2 2020
- Endpoint Protection and Response
- Join for the Excitement. Stay for the People
- Trust Nuspire
- Forrester: Mitigating Ransomware With Zero Trust
- Forrester Now Tech: Global And Emerging Managed Security Services Providers, Q2 2020
- Q1 2020 Threat Report Infographic
- On Demand Webinar: How to set up your own secure network at home
- On Demand Webinar: Q1 2020 Threat Report
- On Demand Webinar: How to Securely Transition from WFH to the Office
- How to Secure Your Endpoints with the Next Generation Endpoint Security
- 3 Proven Tips for Securing Home Networks and the Internet of Things (IoT)
- Begin Developing a Secure Network within your Manufacturing Organization [Checklist]
- Business Continuity Planning Checklist
- 2019 Q4 Threat Report and Year In Review
- Securing Operational Technology
- Next Generation Endpoint Security: What You Need to Know to Be Compliant and Stay Ahead of Risks
- 10 Security Tips for Manufacturers
- The Internet of Medical Things (IoMT) Security Checklist
- On Demand Webinar: Advanced Threats, Tips and Strategies For Today's Manufacturer
- Cybersecurity Health Check: How Secure is your Facility?
- Best Practices for Securing Technology in the Construction Space
- Pharmacy Gains Visibility into its Data Security and Protects its Franchise Customers
- On Demand Webinar: 5 Ways Your Construction Company Can Improve Their Cybersecurity
- On Demand Webinar: Top 5 Cyber Threats of 2019 (So Far)
- On Demand Webinar: Top 5 Cybersecurity Myths Debunked
- Cybersecurity Risks and Solutions for the Manufacturing Industry
- IDC Technology Spotlight
- On Demand Webinar: Phishing Overview
- Annual Visibility Checklist
- Endpoint Detection and Response
- On Demand Webinar: A Look Ahead at the 2020 Threat Landscape
- How to Securely Work Remote
- Company Saves 56 Hours A Month On Cybersecurity Services
- Managing VPN Checklist
- Nuspire Helps in-house IT Team Manage Security Challenges and Stay Within Budget
- Nuspire’s Quarterly Threat Landscape Report: Q3 2019
- Nuspire’s Quarterly Threat Landscape Report: Q1 2020
- Cybersecurity Awareness Guide
- On Demand Webinar: How to Create a Proactive Cybersecurity Program
- Nuspire’s Quarterly Threat Landscape Report: Q1 2019