Common Types of Cyber Attacks
Elizabeth Fichtner
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Read NowBrowse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.
Elizabeth Fichtner
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Read NowRotem Shemesh
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.
Read NowChris Henderson
Based on a published article reporting the findings of a ransomware group named ‘Conti’, the Datto Information Security Team recommends all MSPs evaluate their devices/endpoints for Atera agent activity and determine its legitimacy if necessary.
Read NowRyan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released a Community Script for all MSPs earlier this week on Github. This in-depth explainer video details how to access, apply, run, and interpret the results of the Community Script.
Read NowRyan Weeks
In response to the critical vulnerability referred to as Log4j, Datto released both a Datto RMM component for our partners and a community script for all MSPs.
Read NowRyan Weeks
Datto has not assessed any material exposure to the log4j vulnerability that would impact the safe use of Datto products at this time. Should this assessment change, we will update Datto partners immediately.
Read NowOfir Yaakobi
Emotet, once described as the “world’s most dangerous malware”, was first discovered as a banking Trojan in 2014 and over the years has evolved into the go-to solution for cybercriminals.
Read NowChris Henderson
For many MSPs, cybersecurity is a phenomenal opportunity to add value to clients, and add revenue streams to their existing business operations.
Read NowRotem Shemesh
Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.
Read Now