Cobalt Strike: The New Favorite Among Thieves
Chris Gerritz
Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Read NowDive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.
Chris Gerritz
Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Read NowRyan Weeks
CISO Ryan Weeks sits down with Director of Security Solutions Chris McKie for a fireside-style chat to talk all things ransomware.
Read NowElizabeth Fichtner
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Read NowRotem Shemesh
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.
Read NowChris Henderson
Based on a published article reporting the findings of a ransomware group named ‘Conti’, the Datto Information Security Team recommends all MSPs evaluate their devices/endpoints for Atera agent activity and determine its legitimacy if necessary.
Read NowRyan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released a Community Script for all MSPs earlier this week on Github. This in-depth explainer video details how to access, apply, run, and interpret the results of the Community Script.
Read NowRyan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released both a Datto RMM component for our partners and a community script for all MSPs.
Read NowRyan Weeks
Datto has not assessed any material exposure to the log4j vulnerability that would impact the safe use of Datto products at this time. Should this assessment change, we will update Datto partners immediately.
Read NowOfir Yaakobi
Emotet, once described as the “world’s most dangerous malware”, was first discovered as a banking Trojan in 2014 and over the years has evolved into the go-to solution for cybercriminals.
Read Now