VENDOR

Pax8 accidentally exposes data of ~1,800 MSP partners (link)

  • How it happened: CSV attachment of data sent to 40 recipients by Pax8 account manager

  • Ongoing: Threat actors are offering to buy copies of the exposed data

WatchGuard launches Open MDR for MSPs (link)

  • What is “Open MDR”?: MDR that works off of your existing tool stack. Vendor-agnostic MDR

  • Consideration: Could Open MDR consolidate monitoring of your existing security stack?

Cork Cyber joins the Pax8 Marketplace (link)

  • Why it matters: Cyber warranties are becoming a differentiator for MSPs as cyber liability becomes more top-of-mind for clients

  • Action: Evaluate whether cyber warranty coverage fits your service stack and sales motion, especially for regulated or cyber-insurance-sensitive clients

Sherweb launches Palisade Email Authentication (link)

  • Why it matters: DMARC, SPF, and DKIM are still broken for many SMBs. Palisade gets email working properly faster

Acronis introduces long-term archival storage (link)

  • Why it matters: Compliance-driven retention (legal, healthcare, finance) is growing, and cheap long-term storage unlocks new revenue

  • Check: Any clients with regulatory retention needs?

  • What is Produce8?: Tracks what software users actually use and how they use it. Allows MSPs to address their client’s more directly

  • Benefit to ScalePad: ScalePad owns the MSP QBR space and this acquisition will enable them to make those QBRs even more valuable

Unframe AI expands platform to MSPs (link)

  • What is Unframe AI?: They offer modular AI services so that you don’t have to build out the infrastructure and team to do it yourself

  • Outcome-based billing: Unframe AI charges per outcome (per automated quote, per ticket resolves, etc). This allows MSPs to charge their clients in the same way if desired

SECURITY

Phishing attacks continue to rise as “amateur” threat actors use pre-built Phishing as a Service (PhaaS) kits (link)

  • Insight: 90% of high-volume phishing campaigns leveraged PhaaS kits

  • Main tools used: MFA bypass, URL obfuscation techniques, open redirects, and malicious QR codes

Keep Reading

No posts found