Vulnerability Management as a Service: What Businesses Need to Know

Cyber threats are at an all-time high because the digital world is rapidly changing. Every day, new vulnerabilities are found in security systems. Attacks threaten businesses of all sizes by stealing data, disrupting operations, and damaging reputations. It has become clear that Vulnerability Management as a Service (VMaaS) is an effective managed approach for companies to protect their digital assets without managing security systems themselves.

Redefining WTF in Cybersecurity: Why It's Time to Focus on the Fix

The cybersecurity industry is currently defined by “WTF” moments of panic, from overwhelming vulnerability backlogs to sophisticated AI-driven attacks that bypass traditional defenses. To combat this, organizations must shift their narrative away from reactive frustration and toward the most critical part of exposure management: The Fix. By redefining WTF, security teams can move beyond context-less alerts and manual spreadsheets.

Major Security Event: Supply Chain Compromise in LiteLLM Versions 1.82.7 and 1.82.8

A supply chain compromise that impacted the Python package LiteLLM, with malicious versions 1.82.7 and 1.82.8 was published to PyPI on March 24, 2026. Bitsight Threat Intelligence, public reporting and vendor disclosures indicate the malicious releases included credential harvesting, Kubernetes-focused lateral movement, and persistence mechanisms, creating serious risk for cloud-native and AI-related environments that installed or ran the affected versions.

PowerShell for MSPs: A Practical Guide to Automate Tasks

PowerShell is an amazing scripting language that empowers Managed Service Providers (MSPs) to automate repetitive tasks, dramatically improving efficiency, consistency, and scalability across client environments. While traditional training or formal education may cover the basics, real-world MSP automation requires going beyond the basics with hands-on PowerShell scripting and continuous learning.

AI can do what now?! - Detecting financial fraud with Elastic Security

Financial fraud is increasingly cyber-enabled, requiring organizations to detect complex campaigns across transactions, identities, and digital systems faster and with greater accuracy. Join cybersecurity experts Lisa Jones-Huff and Joe Murin as they discuss how Elastic Security applies AI, machine learning, and generative AI to modern fraud detection. They’ll share how Elastic Security helps teams connect signals, reduce noise, accelerate investigations, and scale fraud prevention through emerging frameworks and standards across financial services organizations.

SIEM-as-a-Service offering leverages Elastic for unified cybersecurity across the US government

The US Cybersecurity and Infrastructure Security Agency (CISA) has launched a SIEM-as-a-Service (SIEMaaS) offering for federal civilian agencies, featuring Elastic Security on Elastic Cloud. SIEMaaS delivers a cloud-based platform for next-generation, AI-powered threat analytics, incident response, and open-standards-based cybersecurity data ingestion.

How MSPs Can Reduce EDR False Positives and Reclaim Profit Margins

• EDR false positives are a structural profitability problem for MSPs, not just a technical nuisance. Under flat-fee, per-incident, and man-hours pricing models, every false alert erodes margins directly. • Seventy-five percent of MSPs experience alert fatigue at least monthly, and MSPs managing 1,000+ clients report daily fatigue (Source: Heimdal, The State of MSP Agent Fatigue, 2025).

Ep. 51 - 2026 Cyber War Update: Handala, MuddyWater, and the Rise of Destructive Attacks

Iranian cyber attacks are escalating—shifting from espionage to destructive, large-scale operations. In this episode, we break down what CISOs need to know. Host Tova Dvorin and offensive security expert Adrian Culley analyze the latest Iranian cyber threat activity, including groups like Handala (Void Manticore) and MuddyWater (Mango Sandstorm), and how their tactics are evolving.