In partnership with

Hot Headlines 🔥

🩹 Veeam Drops Patches for 7 Critical Flaws
Veeam has just released an emergency patch cycle covering seven CVEs, multiple scoring critical. The worst: an authenticated domain user can achieve remote code execution on the Backup Server. 

What this means for MSPs: If you manage Veeam for clients (and statistically, most of you do), this is a drop-everything situation. An attacker who already has any domain foothold can pivot straight to your backup server — game over for recovery. Patch ASAP or document why you haven't.

☘️ Microsoft March Patch Tuesday: 84 Fixes, 2 Zero-Days Already in the Wild
Microsoft landed 84 security fixes — eight critical, 76 important. Forty-six of the patched vulns are privilege escalation flaws. Two zero-days are confirmed publicly known and actively exploited.

What this means for MSPs: Standard Patch Tuesday drill, but the zero-days mean the clock is running. Prioritize privilege escalation patches first — that's attacker bread-and-butter for lateral movement. Get your RMM automated patch jobs reviewed and confirmed this week.

⛈️ Storm-2561 Is Spreading Trojanized VPN Clients via SEO Poisoning
Microsoft disclosed a new threat actor pushing digitally signed malicious VPN installers through search engine results. Users Googling for legitimate enterprise VPN software get redirected to attacker-controlled lookalike sites. The installers look and work like the real thing.

What this means for MSPs: Your end users are Googling software. Two moves:

  1. Lock down software installation to MSP-managed channels only.

  2. Send clients a one-paragraph heads-up this week — no jargon, just "only install software we send you."

🗺️ FortiGate Firewalls Being Actively Exploited to Steal Credentials and Map Networks
Threat actors are targeting Fortinet NGFWs with recently disclosed vulns and weak credentials to extract service account creds and map victim network topology. 

What this means for MSPs: Audit every Fortinet appliance you manage. Default credentials, old firmware, exposed management interfaces — any of these is your client's network on a platter. Run the check today, not next quarter.

Supercharge Your AI Development with Narrow

AI teams, developers, and product innovators… are you ready to build smarter and ship faster? Narrow is an automated prompt engineering and optimization platform that takes the guesswork out of working with large language models. Instead of spending hours writing, testing, and tuning prompts, Narrow does it for you — generating high-quality prompts, testing them across models, and continuously optimizing for performance, cost, and speed.

What you’ll love:
💬 Automatically generate and refine expert-level prompts
🧪 Test and compare performance across multiple LLMs
📉 Reduce AI costs by up to 95% with smarter model selection
Deploy AI features up to 10× faster than manual workflows

Whether you’re building AI-powered products, scaling LLM features, or just want to get more value from your AI stack — Narrow streamlines your workflow so you can focus on innovation, not iteration. Learn more and book a demo today at getnarrow.ai

MSP Ops Corner

3-minute SOP: Emergency Patch Priority Triage

When a heavy patch week hits, don't just run everything at once. Use this triage:

  1. Score by exposure — Remotely exploitable? Hits a backup or domain-critical system? Those go first.

  2. Check active exploitation — Is it on CISA's KEV catalog? If yes, it skips the queue entirely.

  3. Batch by risk tier — Critical systems (backup, DCs, firewalls) patched within 24h. Everything else within 72h. 

Bookmark CISA's KEV catalog. It's free, updated daily, and tells you exactly what's being actively exploited right now.

The Channel Rumor Mill 💬

☁️ Salesforce Experience Cloud misconfigurations are getting mass-scanned using a modified AuraInspector tool. If any of your clients use public-facing Salesforce Experience Cloud, their guest user permissions may be exposing sensitive data right now. Not a patch issue — a config audit issue. Worth a call.

💡 IBM X-Force confirmed that threat actor Hive0163 used AI-coded malware ("Slopoly") in active ransomware campaigns. The barrier to building custom malware just collapsed. Make sure your EDR vendor is paying attention.

Attio is the AI CRM for modern teams.

Connect your email and calendar, and Attio instantly builds your CRM. Every contact, every company, every conversation, all organized in one place.

Then Ask Attio anything:

  • Prep for meetings in seconds with full context from across your business

  • Know what’s happening across your entire pipeline instantly

  • Spot deals going sideways before they do

No more digging and no more data entry. Just answers.

Keep Reading