Mytech Blog https://blog.mytech.com en Fri, 07 Oct 2022 20:59:51 GMT 2022-10-07T20:59:51Z en Security Alert: Critical vulnerability in select Fortinet products https://blog.mytech.com/security-alert-fortinet-products-vulnerability <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-fortinet-products-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/SecurityAlert%20Fortinet-1.jpeg" alt="Security Alert: Critical vulnerability in select Fortinet products" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div style="text-align: left;"> <p>Fortinet has recently <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-admins-to-patch-critical-auth-bypass-bug-immediately/">announced a severe vulnerability</a> in certain firewalls and web proxies: CVE-2022-40684 allows an unauthenticated attacker to remotely access admin controls from outside the network, <strong>posing a serious security threat to unpatched devices</strong>.</p> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-fortinet-products-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/SecurityAlert%20Fortinet-1.jpeg" alt="Security Alert: Critical vulnerability in select Fortinet products" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div style="text-align: left;"> <p>Fortinet has recently <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-admins-to-patch-critical-auth-bypass-bug-immediately/">announced a severe vulnerability</a> in certain firewalls and web proxies: CVE-2022-40684 allows an unauthenticated attacker to remotely access admin controls from outside the network, <strong>posing a serious security threat to unpatched devices</strong>.</p> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fsecurity-alert-fortinet-products-vulnerability&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Fri, 07 Oct 2022 20:59:51 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/security-alert-fortinet-products-vulnerability 2022-10-07T20:59:51Z Security Alert: Phishing vulnerability 'Follina' in Office files https://blog.mytech.com/security-alert-follina-microsoft-office <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-follina-microsoft-office" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/SecurityAlertFollina.jpeg" alt="Security Alert: Phishing vulnerability 'Follina' in Office files" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div style="text-align: left;"> <span style="background-color: transparent;">A newly-discovered malicious exploit for Microsoft Office files has made headlines over the weekend: </span> <a href="https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug" style="background-color: transparent;"><strong>the “Follina” MSDT attack</strong></a> <span style="background-color: transparent;"> uses programs like Microsoft Word to execute malicious code when a prepared file is accessed, allowing an attacker significant access to a device, where they can then deploy further exploits and do even greater damage.</span> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-follina-microsoft-office" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/SecurityAlertFollina.jpeg" alt="Security Alert: Phishing vulnerability 'Follina' in Office files" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div style="text-align: left;"> <span style="background-color: transparent;">A newly-discovered malicious exploit for Microsoft Office files has made headlines over the weekend: </span> <a href="https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug" style="background-color: transparent;"><strong>the “Follina” MSDT attack</strong></a> <span style="background-color: transparent;"> uses programs like Microsoft Word to execute malicious code when a prepared file is accessed, allowing an attacker significant access to a device, where they can then deploy further exploits and do even greater damage.</span> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fsecurity-alert-follina-microsoft-office&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Tue, 31 May 2022 19:53:14 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/security-alert-follina-microsoft-office 2022-05-31T19:53:14Z Security Alert: Critical Log4j Vulnerability https://blog.mytech.com/critical-log4j-vulnerability <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/critical-log4j-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Log4j.jpeg" alt="Security Alert: Critical Log4j Vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Update 12.22.21. This vulnerability <span style="background-color: transparent;">continues to pose a major risk for many organizations. Due to the nature of this exploit, </span><span style="text-decoration: underline;">your greatest risk likely comes through any vendor that provides software to your organization</span><span style="background-color: transparent;">. If you have not already discussed this vulnerability with each of your vendors and confirmed that their patches are up to date, do so immediately.</span></p> <div> <div> <span style="font-weight: bold;">In addition, you should <span style="text-decoration: underline;">discuss your exposure level with your IT provider</span>, to determine any potential points of attack on your network. Mytech is working behind the scenes to catalogue and track security updates from our clients' vendors, to help us quickly assess any remaining risks. But the threat of this attack remains high, and <span style="text-decoration: underline;">your IT provider cannot defend you from vendor vulnerabilities that they don't know about</span>.</span> </div> <div style="text-align: center;"> <span style="font-weight: bold;">---</span> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/critical-log4j-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Log4j.jpeg" alt="Security Alert: Critical Log4j Vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Update 12.22.21. This vulnerability <span style="background-color: transparent;">continues to pose a major risk for many organizations. Due to the nature of this exploit, </span><span style="text-decoration: underline;">your greatest risk likely comes through any vendor that provides software to your organization</span><span style="background-color: transparent;">. If you have not already discussed this vulnerability with each of your vendors and confirmed that their patches are up to date, do so immediately.</span></p> <div> <div> <span style="font-weight: bold;">In addition, you should <span style="text-decoration: underline;">discuss your exposure level with your IT provider</span>, to determine any potential points of attack on your network. Mytech is working behind the scenes to catalogue and track security updates from our clients' vendors, to help us quickly assess any remaining risks. But the threat of this attack remains high, and <span style="text-decoration: underline;">your IT provider cannot defend you from vendor vulnerabilities that they don't know about</span>.</span> </div> <div style="text-align: center;"> <span style="font-weight: bold;">---</span> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fcritical-log4j-vulnerability&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Tue, 14 Dec 2021 18:49:33 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/critical-log4j-vulnerability 2021-12-14T18:49:33Z Security Alert: Phishing Risks from Threat Actor Nobelium Remain High https://blog.mytech.com/security-alert-nobelium-attack <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-nobelium-attack" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Nobelium%20Phishing%20Alert.jpeg" alt="password login decorative image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have heard about the <a href="https://blogs.microsoft.com/on-the-issues/2021/10/24/new-activity-from-russian-actor-nobelium/"><span style="font-weight: bold;">recent cyberattack activity from Russian actor Nobelium</span></a>, a nation-state group that was responsible for the SolarWinds breach of 2020. Experts in the cybersecurity industry expect these attacks to continue, so awareness and diligence in preventing phishing attacks and breaches is crucial – for both managed services providers like Mytech, as well as each of our end users.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-nobelium-attack" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Nobelium%20Phishing%20Alert.jpeg" alt="password login decorative image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have heard about the <a href="https://blogs.microsoft.com/on-the-issues/2021/10/24/new-activity-from-russian-actor-nobelium/"><span style="font-weight: bold;">recent cyberattack activity from Russian actor Nobelium</span></a>, a nation-state group that was responsible for the SolarWinds breach of 2020. Experts in the cybersecurity industry expect these attacks to continue, so awareness and diligence in preventing phishing attacks and breaches is crucial – for both managed services providers like Mytech, as well as each of our end users.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fsecurity-alert-nobelium-attack&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Mon, 25 Oct 2021 16:45:52 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/security-alert-nobelium-attack 2021-10-25T16:45:52Z Security Alert: Exploit for Malicious Microsoft Office Attachments https://blog.mytech.com/security-alert-malicious-office-attachments <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-malicious-office-attachments" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Microsoft%20Docs%20Exploit.jpg" alt="compromised email attachment with hazard sign" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have heard about&nbsp;<strong><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444">the recently-announced security vulnerability</a></strong>&nbsp;that makes use of malicious code embedded in Microsoft Office documents. This exploit is possible if a user opens or even&nbsp;<em>previews</em>&nbsp;the malicious document in Outlook or Windows Explorer, and can grant an attacker significant access to the user’s network and privileges to cause further harm.</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/security-alert-malicious-office-attachments" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/Microsoft%20Docs%20Exploit.jpg" alt="compromised email attachment with hazard sign" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have heard about&nbsp;<strong><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444">the recently-announced security vulnerability</a></strong>&nbsp;that makes use of malicious code embedded in Microsoft Office documents. This exploit is possible if a user opens or even&nbsp;<em>previews</em>&nbsp;the malicious document in Outlook or Windows Explorer, and can grant an attacker significant access to the user’s network and privileges to cause further harm.</p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fsecurity-alert-malicious-office-attachments&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Fri, 10 Sep 2021 20:30:39 GMT marketing@mytech.com (mytechpartners) https://blog.mytech.com/security-alert-malicious-office-attachments 2021-09-10T20:30:39Z PrintNightmare Vulnerability in Majority of Windows Devices https://blog.mytech.com/printnightmare-vulnerability <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/printnightmare-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/PrintNightmare.jpeg" alt="PrintNightmare Vulnerability in Majority of Windows Devices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;"><span style="text-decoration: underline;">UPDATE – July 7 @ 11:45am:</span> Microsoft has now published a patch to mitigate this vulnerability, and Mytech is already working on deploying it to our clients as securely and non-disruptively as possible. Further information about this process has been emailed out to our clients. If you experience any issues or have questions about this out-of-band patch, please contact your Mytech team for more info.</p> <p>The <a href="https://www.huntress.com/blog/critical-vulnerability-printnightmare-exposes-windows-servers-to-remote-code-execution">newly discovered “PrintNightmare” vulnerability</a> allows malicious actors to access a computer or server by sending commands to a built-in service that is enabled by default on all Windows machines (“Print Spooler”). This vulnerability is not public – attackers either need to be sharing a network with the target device, or need to have already gained access through a different attack. Despite this limitation, the severity of this exploit (and the ease of its execution) still makes this a critical concern, for both business and personal devices.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/printnightmare-vulnerability" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/PrintNightmare.jpeg" alt="PrintNightmare Vulnerability in Majority of Windows Devices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;"><span style="text-decoration: underline;">UPDATE – July 7 @ 11:45am:</span> Microsoft has now published a patch to mitigate this vulnerability, and Mytech is already working on deploying it to our clients as securely and non-disruptively as possible. Further information about this process has been emailed out to our clients. If you experience any issues or have questions about this out-of-band patch, please contact your Mytech team for more info.</p> <p>The <a href="https://www.huntress.com/blog/critical-vulnerability-printnightmare-exposes-windows-servers-to-remote-code-execution">newly discovered “PrintNightmare” vulnerability</a> allows malicious actors to access a computer or server by sending commands to a built-in service that is enabled by default on all Windows machines (“Print Spooler”). This vulnerability is not public – attackers either need to be sharing a network with the target device, or need to have already gained access through a different attack. Despite this limitation, the severity of this exploit (and the ease of its execution) still makes this a critical concern, for both business and personal devices.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fprintnightmare-vulnerability&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Wed, 07 Jul 2021 04:45:00 GMT marketing@mytech.com (mytechpartners) https://blog.mytech.com/printnightmare-vulnerability 2021-07-07T04:45:00Z Kaseya VSA Attack: Why Mytech Isn't Affected, What We're Doing Anyway https://blog.mytech.com/kaseya-attack <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/kaseya-attack" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_265961756.jpeg" alt="cybersecurity world map" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have seen the news about a <a href="https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689">supply-chain ransomware attack on Kaseya</a> which affected numerous businesses over the holiday weekend. The targeted company, Kaseya, provides tools to Managed Services Providers (MSPs) like Mytech. One of these tools, “Kaseya VSA,” was recently compromised by an international cybercrime organization, then used to attack roughly 60 MSPs and, by extension, up to 1,500 end-user organizations.</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/kaseya-attack" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_265961756.jpeg" alt="cybersecurity world map" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>You may have seen the news about a <a href="https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689">supply-chain ransomware attack on Kaseya</a> which affected numerous businesses over the holiday weekend. The targeted company, Kaseya, provides tools to Managed Services Providers (MSPs) like Mytech. One of these tools, “Kaseya VSA,” was recently compromised by an international cybercrime organization, then used to attack roughly 60 MSPs and, by extension, up to 1,500 end-user organizations.</p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fkaseya-attack&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Alerts Tue, 06 Jul 2021 17:55:18 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/kaseya-attack 2021-07-06T17:55:18Z Security Alert: Critical Vulnerability in Microsoft Exchange https://blog.mytech.com/critical-vulnerability-in-microsoft-exchange <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/critical-vulnerability-in-microsoft-exchange" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/ZeroDayExchangeBlogPhoto.jpeg" alt="email security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Microsoft recently announced <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" style="font-weight: bold;">the discovery of a critical exploit in its Exchange Server products</a>: these&nbsp;</span>vulnerabilities are simple for attackers of any sophistication level to exploit. <strong>Microsoft has advised any organizations that use on-premise Exchange servers, or have servers with “OWA” websites open to the internet for any reason, to deploy these patches immediately</strong>, as well as evaluate their systems for any indicators of compromise (IOCs).</p> <p>This exploit does not exist for organizations who have migrated to Microsoft 365, due to differences in how email is hosted. As the majority of our clients use Microsoft 365, <strong>only a</strong> <strong>few organizations partnered with Mytech have been exposed to this vulnerability at all</strong>.</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/critical-vulnerability-in-microsoft-exchange" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/ZeroDayExchangeBlogPhoto.jpeg" alt="email security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Microsoft recently announced <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" style="font-weight: bold;">the discovery of a critical exploit in its Exchange Server products</a>: these&nbsp;</span>vulnerabilities are simple for attackers of any sophistication level to exploit. <strong>Microsoft has advised any organizations that use on-premise Exchange servers, or have servers with “OWA” websites open to the internet for any reason, to deploy these patches immediately</strong>, as well as evaluate their systems for any indicators of compromise (IOCs).</p> <p>This exploit does not exist for organizations who have migrated to Microsoft 365, due to differences in how email is hosted. As the majority of our clients use Microsoft 365, <strong>only a</strong> <strong>few organizations partnered with Mytech have been exposed to this vulnerability at all</strong>.</p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fcritical-vulnerability-in-microsoft-exchange&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security / Cybersecurity News Security Alerts Wed, 03 Mar 2021 17:00:00 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/critical-vulnerability-in-microsoft-exchange 2021-03-03T17:00:00Z Security Alert: Sophisticated Cybersecurity Attacks on US Healthcare Industry https://blog.mytech.com/sophisticated-cybersecurity-attacks-on-us-healthcare-industry <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/sophisticated-cybersecurity-attacks-on-us-healthcare-industry" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_144104970.jpeg" alt="Security Alert: Sophisticated Cybersecurity Attacks on US Healthcare Industry" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>The FBI,&nbsp;</span><span>the&nbsp;</span><span>Department of Homeland Security, and (unusually)&nbsp;</span><span>the&nbsp;</span><span>Department of Health and Human Services</span><span>&nbsp;</span><span>recently released&nbsp;</span><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf"><strong><span>a joint advisor</span></strong><strong><span>y warning of an imminent, credible threat to the cybersecurity of US healthcare institutions</span></strong></a><span>.</span><span>&nbsp;</span><span>Based on information discovered in the past several days, this attack is expected to come from an&nbsp;</span><span>established&nbsp;</span><span>cyber</span><span>criminal group in Russia</span><span>, which is&nbsp;</span><span>preparing to attack hundreds of US targets in healthcare and&nbsp;</span><span>related&nbsp;</span><span>industries.&nbsp;</span><span>&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/sophisticated-cybersecurity-attacks-on-us-healthcare-industry" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_144104970.jpeg" alt="Security Alert: Sophisticated Cybersecurity Attacks on US Healthcare Industry" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>The FBI,&nbsp;</span><span>the&nbsp;</span><span>Department of Homeland Security, and (unusually)&nbsp;</span><span>the&nbsp;</span><span>Department of Health and Human Services</span><span>&nbsp;</span><span>recently released&nbsp;</span><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf"><strong><span>a joint advisor</span></strong><strong><span>y warning of an imminent, credible threat to the cybersecurity of US healthcare institutions</span></strong></a><span>.</span><span>&nbsp;</span><span>Based on information discovered in the past several days, this attack is expected to come from an&nbsp;</span><span>established&nbsp;</span><span>cyber</span><span>criminal group in Russia</span><span>, which is&nbsp;</span><span>preparing to attack hundreds of US targets in healthcare and&nbsp;</span><span>related&nbsp;</span><span>industries.&nbsp;</span><span>&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fsophisticated-cybersecurity-attacks-on-us-healthcare-industry&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security / Cybersecurity Security Alerts Thu, 29 Oct 2020 19:38:05 GMT jfondell@mytech.com (Jonathan Fondell) https://blog.mytech.com/sophisticated-cybersecurity-attacks-on-us-healthcare-industry 2020-10-29T19:38:05Z Hackers Actively Targeting Managed Service Providers (MSPs) https://blog.mytech.com/hackers-actively-targeting-managed-service-providers <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/hackers-actively-targeting-managed-service-providers" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_72980022%20%281%29_Small.jpg" alt="AdobeStock_72980022 (1)_Small" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>It’s all over the news.&nbsp;&nbsp;</span><span>Hackers are actively targeting managed service providers (MSPs)&nbsp;</span><span>in an attempt to</span><span>&nbsp;simultaneously infect all of their clients with&nbsp;</span><span>r</span><span>ansomware or&nbsp;</span><span>m</span><span>alware.</span><span>&nbsp;</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blog.mytech.com/hackers-actively-targeting-managed-service-providers" title="" class="hs-featured-image-link"> <img src="https://blog.mytech.com/hubfs/AdobeStock_72980022%20%281%29_Small.jpg" alt="AdobeStock_72980022 (1)_Small" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>It’s all over the news.&nbsp;&nbsp;</span><span>Hackers are actively targeting managed service providers (MSPs)&nbsp;</span><span>in an attempt to</span><span>&nbsp;simultaneously infect all of their clients with&nbsp;</span><span>r</span><span>ansomware or&nbsp;</span><span>m</span><span>alware.</span><span>&nbsp;</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=5277307&amp;k=14&amp;r=https%3A%2F%2Fblog.mytech.com%2Fhackers-actively-targeting-managed-service-providers&amp;bu=https%253A%252F%252Fblog.mytech.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security / Cybersecurity News Security Alerts Thu, 18 Jul 2019 15:45:10 GMT skingslien@mytech.com (Stephanie Kingslien) https://blog.mytech.com/hackers-actively-targeting-managed-service-providers 2019-07-18T15:45:10Z