Quorum Cyber Climbs 20 Places to #30 in MSSP Alert Top 250

Posted in Commentary with tags on December 18, 2025 by itnerd

Quorum Cyber has ranked in 30th place this year in the 2025 MSSP Alert Top 250 – MSSP Alert’s annual list and research tracking the world’s top managed security services providers (MSSPs).

The company has jumped 20 places from its ranking of 50th in 2024, and since 2022 has risen by almost 120 positions. The rating is a measure of the company’s range of managed cybersecurity services and the types of cyber incident it has handled in the past 12 months, along with its revenue and headcount figures.

MSSP Alert is one of the leading online resources that reviews and assesses MSSPs and how they contribute to cybersecurity across the wider global economy. In an ever-evolving market, the MSSP Top 250 sets a benchmark for service excellence and innovation and keeps organizations and decision makers informed about the breadth and quality of services available in the market.

MSSP Alert compares cybersecurity service providers on several criteria including:

  • Annual recurring revenues
  • Profitability
  • Business growth rate
  • Cybersecurity professional headcount
  • Managed security services offered
  • MSSP Alert’s editorial coverage of MSSPs worldwide
  • Third-party industry honors from analysts such as Gartner, Forrester, and IDC

In 2025 Quorum Cyber continued to build momentum for a new phase of growth for 2026 and beyond. The company launched its new Threat Division, made several exciting Executive Appointments, and won a string of Prestigious Awards. All this on top of integrating its two major acquisitions: Difenda and Kivu Consulting.

New Threat Business Unit

In January 2025, the business launched its new Threat business unit and appointed Paul Caiazzo as Chief Threat Officer. As a cybersecurity engineer, entrepreneur, and strategist with over 27 years’ experience, Paul brings a wealth of knowledge and expertise to the role, having previously developed cybersecurity businesses from the ground up. The Threat division of Quorum Cyber covers threat intelligence, threat hunting, incident response and ransom negotiations. The team is trusted by regulated sectors, has Preferred Vendor Status with over 40 insurance companies, and has established law firm partnerships with top boutique and full-service law firms.

Strengthened Leadership Team with New Senior Appointments

Quorum Cyber also strengthened its leadership team in 2025 with several senior appointments:

  • Chief Revenue Officer (CRO) Mike LaPeters joined the business with 30 years’ experience in building and leading sales and marketing organizations and channels for security, storage and infrastructure software products.
  • Stacey Sweeney brings nearly 30 years of cybersecurity marketing leadership experience to the Chief Marketing Officer (CMO) role. In her career to date, she has built high-performing teams to shape and revitalize brands.
  • With more than two decades of senior leadership experience in the enterprise technology sector, Melissa Webb’s role as Vice President – Microsoft Partnership will drive and grow Quorum Cyber’s strategic partnership globally.
  • And, as a seasoned risk and cybersecurity executive with over 25 years’ experience, John Bruce joined as the company’s Chief Information Security Officer (CISO) to further strengthen defenses across the business.

Awards and Recognition

In April 2025, Quorum Cyber won the Microsoft Security MSSP of the Year 2025 award at the Microsoft Excellence Awards. It also reached the finals of two more categories: Data Security & Compliance Trailblazer, and Security Changemaker. And for the second consecutive year, it was named as a Finalist in the 2025 Microsoft Security Partner of the Year awards, in November.

This month the company was named as a Microsoft Security Excellence Awards Finalist for Data Security & Compliance Trailblazer and Security Service Partner of the Year. Quorum Cyber has been named as a finalist in at least two categories at the Microsoft Security Excellence Awards since 2023, showing remarkable consistency in providing the highest standards of service delivery and satisfaction to customers worldwide.

Quorum Cyber was awarded Managed Security Service Provider of the Year at the CyberSecurity Breakthrough Awards 2025 in October and won Cybersecurity Company of the Year at the Scottish Cyber Awards 2025 in February.

With the Microsoft partnership being one of the pillars of the company’s success, Quorum Cyber also achieved the Identity and Access Management Specialization from Microsoft this year. As a Microsoft Solutions Partner for Security, the company now holds all four available Microsoft Security specializations: 1) Threat Protection, 2) Cloud Security, 3) Information Protection and Governance, and 4) Identity and Access Management. Building on this, in October Quorum Cyber was named as a proud participant of both the Microsoft Security Store Partner Ecosystem and the Microsoft Sentinel Partner Ecosystem.

Get A Deal On The Samsung Galaxy S25 FE For Last Minute Gift Giving

Posted in Commentary with tags on December 18, 2025 by itnerd

With the holidays just around the corner, here’s  a last-minute Samsung gift idea that’s currently available:  

Galaxy S25 FE 
From $919.99 (128GB) — Save $170 with code GETS25FE –   

Featuring a large 6.7-inch display, the Galaxy S25 FE delivers a premium viewing experience for streaming, scrolling, and everyday multitasking. Designed for photography lovers and social sharers, it brings flagship-grade AI tools like Photo Assist and Live Translate to a more accessible device, wrapped in a premium design that fits any lifestyle. A strong-value smartphone gift for anyone looking to upgrade before the holidays without paying flagship pricing.  

For a full list of Samsung holiday deals, visit Samsung.com/ca

Ericsson 4.5 GHz Massive MIMO AIR 3255 radios operational in DOCOMO’s 5G network

Posted in Commentary with tags on December 18, 2025 by itnerd

Ericsson AIR 3255 Massive MIMO antenna-integrated radios are operating live in Japanese communications service provider (CSP) NTT DOCOMO, INC’s.(“DOCOMO”) 5G network. Covering the 4.5 GHz band, the new radios will help to meet current and future 5G network traffic needs in areas with high traffic congestion and demand.

Live AIR 3255 network operations began in December 2025 to help DOCOMO deliver the high‑quality network experience its customers expect.

Powered by the latest Ericsson Silicon, the AIR 3255 Massive MIMO radio delivers 25 percent lower energy use, and 20 percent reduction in embodied CO2 footprint, compared to the previous generation.  

At just 13kg, the unit is 20 percent lighter than the previous generation, further easing deployment in high-traffic locations. Customer network connectivity experiences will also be enhanced by advanced unit features such as multi-user MIMO – which delivers throughput regardless of network congestion.

The Ericsson AIR 3255 will also enable spectrum to be used more efficiently as data traffic grows. Working with DOCOMO’s current 3.7 GHz-band Massive MIMO 5G radios, it will also make the network more flexible and reliable.

New Chinese group LongNosedGoblin deploys cyberespionage tools in Southeast Asia and Japan: ESET 

Posted in Commentary with tags on December 18, 2025 by itnerd

ESET Research has discovered a new China-aligned APT group, LongNosedGoblin, that abuses Group Policy – a mechanism for managing settings and permissions on Windows machines, typically used with Active Directory – to deploy malware and move laterally across the compromised network. It is used to deploy cyberespionage tools across networks of governmental institutions in Southeast Asia and Japan. In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. However, the group has been active since at least since September 2023. As of this September, ESET began observing renewed activity by the group in the region. It deploys malware across the compromised network, and cloud services (e.g., Microsoft OneDrive and Google Drive) for Command & Control (C&C).

LongNosedGoblin has several tools in its arsenal. NosyHistorian is a C#/.NET application that the group uses to collect browser history from Google Chrome, Microsoft Edge, and Mozilla Firefox, which is then used to determine where to deploy further malware. NosyDoor collects metadata about the victim’s machine, including the machine name, username, the OS version, and the name of the current process, and sends it all to the C&C. It then retrieves and parses task files with commands from the C&C. The commands allow it to exfiltrate files, delete files, and execute shell commands, among other things.

NosyStealer is used to steal browser data from Microsoft Edge and Google Chrome. NosyDownloader executes a chain of obfuscated commands, and downloads and runs a payload in memory. Among other tools used by LongNosedGoblin, ESET identified a C#/.NET keylogger NosyLogger, which seems to be a modified version of the open-source keylogger DuckSharp. Among other tools used by the group is a reverse SOCKS5 proxy, and an argument runner (a tool that runs an application passed as an argument) that was used to run a video recorder, likely FFmpeg, to capture audio and video.

For a more detailed analysis of LongNosedGoblin’s arsenal, check out the latest ESET Research blogpost “LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan” on WeLiveSecurity.com.

 Google is shutting down its Dark Web Monitoring tool in February 2026

Posted in Commentary with tags on December 18, 2025 by itnerd

 Google is shutting down its Dark Web Monitoring tool in February 2026 (less than 2 years after its launch). Google is sending out emails to anyone who signed up for a dark web monitoring profile, explaining that the service is shutting down. The company will stop monitoring for new results on January 15, 2026, and data will no longer be available from February 16, 2026.

Marcelo Casto Escalada, Senior Product Manager at Outpost24, has weighed in with this commentary: 

“Google’s decision to sunset its Dark Web Monitoring tool isn’t surprising. It reinforces a long-standing reality in threat intelligence: dark web monitoring is a specialized discipline, not a feature you can simply bolt onto an account management platform. Alerting users that their email may appear in illicit forums is very different from delivering actionable intelligence with context, prioritization, and clear remediation. Real threat intelligence is built on deep collection, expert analysis, and operational relevance — capabilities that mature providers have developed over many years. Organizations looking to genuinely reduce risk need proven expertise, not lightweight add-ons.”

While all of that is accurate, at least what Google was doing was something that you could use along with other tools. Now there’s one less tool in the toolkit that defenders can rely on. That’s a shame.

Centreon Endorses the UN Open Source Principles    

Posted in Commentary with tags on December 18, 2025 by itnerd

Centreona leader in observability for digital performance, today announced its endorsement of the United Nations Open Source Principles, joining a growing community of organizations committed to responsible, collaborative, and scalable open-source development.

This endorsement reflects a natural continuation of Centreon’s 20-year open-source journey and aligns with the company’s own Open Source Manifesto

The UN Open Source Principles provide guidelines to promote collaboration and the adoption of open-source technologies within the UN and globally. Open Source United, a community of practice established by the UN Chief Executive Board’s Digital Technology Network (DTN), works to advance open source technologies across UN agencies, funds and programmes. It encourages collaboration and scalable solutions to support the delivery of UN mandates. The UN Open Source Principles consist of eight guidelines that offer a framework for the use, development, and sharing of Open Source software across the Organization.

For Centreon, the endorsement of the UN Open Source Principles confirms that the company’s long-standing practices are aligned with globally recognized principles, strengthening its role within the open-source ecosystem and supporting continued innovation across industries.

A Cybersecurity Specialist’s Survival Guide for the Holiday Season From Outpost24

Posted in Commentary with tags on December 18, 2025 by itnerd

With the holidays right around the corner, and cybercriminals’ activity increasing during business downtime, it is more important than ever for organizations and individuals both to take practical steps to protect themselves from potential cyber-attacks. 

Noé Mantel, Cybersecurity Specialist at Outpost24, has shared the following tips for how to do just that:

Tip #1: Check the reliability of your backups 

Before going on holiday, it is essential to ensure that critical backups are up to date, functional, and stored offline. Organizations should systematically test their data recovery procedures and ensure that no backups are stored on the same network as production systems to prevent ransomware from encrypting or deleting them. 

Tip #2: Apply updates and patches before the holidays 

The end of the year is an ideal time to deploy pending patches and update obsolete software. Regular vulnerability analysis allows you to prioritize risks and fix systems exposed to the internet or close to critical assets first. A centralized patch management system, based on risk assessment, is an essential pillar of effective security. 

Tip #3: Strengthen your network security 

Multi-layered segmentation limits an attacker’s lateral movement in the event of an intrusion. Filtering malicious IP addresses, using URL whitelists, and closing unnecessary ports are simple actions that greatly reduce the attack surface. Regular traffic analysis also helps identify potential anomalies. 

Tip #4: Closely monitor the most exposed services 

Remote access such as RDP and VPNs must be protected by automatic locking mechanisms and monitored via connection logs. It is also recommended to disable all unused ports and to check the security practices of third-party service providers and employees working remotely. 

Tip #5: Avoid public USB ports when travelling 

Juice jacking remains an emerging and little-known threat. Companies must educate their teams never to use public charging ports in train stations, hotels or airports. A personal mains charger or external battery is the safest alternative. 

Tip #6: Adopt rigorous identity and access management 

Identity control is central to protecting infrastructure. IAM provides complete visibility into users, their permissions and their login behavior. Contextual analysis and artificial intelligence make it easier to detect anomalies without imposing overly restrictive rules. 

Tip #7: Strengthen your passwords and MFA 

The implementation of unique, sufficiently complex and regularly renewed passwords remains a fundamental aspect of cybersecurity. The use of password managers and the systematic adoption of multi-factor authentication significantly reduce the risk of compromise. Tools that block compromised passwords further strengthen this essential barrier. 

Telehouse Canada Partners with Megaport to Deliver Advanced Cloud Connectivity Solutions

Posted in Commentary on December 18, 2025 by itnerd

Telehouse Canada has announced a strategic partnership with Megaport, a global leader in Network as a Service (NaaS). The partnership will bring advanced cloud connectivity options to Telehouse Canada data centres, enabling Telehouse Canada’s customers to access Megaport’s extensive global network ecosystem of more than 280 cloud on-ramps and over 300 service providers, delivering flexible, scalable connectivity to leading cloud platforms and global IT services.

Organizations within Telehouse Canada’s ecosystem can now easily build flexible, high-performance network architectures that support a range of workloads, including hybrid and multi-cloud environments. The Megaport Portal is accessible from all Telehouse Canada data centres, allowing businesses to establish private connections to global locations across the regions where Megaport operates.

Through Megaport’s global platform, the integration simplifies cloud networking by enabling on-demand scalability and improving operational efficiency. Organizations can access a broad range of connectivity services, including Megaport Cloud Routers for direct data transfer between multiple clouds, while API integration automates the deployment and management of scalable services.

Organizations can also access Megaport’s AI Exchange (AIx) advanced ecosystem, designed to enhance connectivity for AI-driven organizations. This intuitive global platform enables seamless integration and instant access to leading GPUaaS providers, neoclouds, third-party AI models, storage and compute. AIx empowers organizations to seamlessly interconnect with AI resources while ensuring the rapid and reliable delivery of all global AI capabilities.

Telehouse Canada and Megaport are committed to advancing their collaboration, working together to strengthen the digital foundations that support Canadian organizations. Together, they aim to help shape the future of secure, high-performance connectivity in Canada and beyond.

Hypori Launches New Global Partner Program

Posted in Commentary with tags on December 18, 2025 by itnerd

Hypori today announced the launch of the Hypori Partner Program, enabling resellers, managed service providers (MSPs), system integrators (SIs), and technology partners to unlock new revenue opportunities by delivering secure mobile access — without data ever touching the device.

The program formalizes Hypori’s rapidly increasing partner momentum across commercial and public sector markets, following successful collaborations with Carahsoft, Amazon Web Services (AWS), Zscaler, and Summit 7. With dedicated enablement resources, deal registration, incentives, and co-marketing support, Hypori is deepening channel investment and expanding its ecosystem to capture part of the global BYOD market that industry analysts predict to have strong growth. In fact, Data Bridge Market Research estimates that the sector will experience a CAGR of 9.2% and is expected to reach $188.3 billion in market size.

As organizations eliminate second-device programs and embrace BYOD with zero-trust requirements, demand for VMI is surging. Hypori enables secure access to enterprise and government resources — without data ever residing on the personal device — helping customers cut device spend, reduce compliance risk, and protect data across a number of security standards – such as Cybersecurity Maturity Model Certification (CMMC), Health Insurance Portability and Accountability Act (HIPAA), Federal Risk and Authorization Management Program (FedRAMP) High, General Data Protection Regulation (GDPR), Commercial Solutions for Classified (CSfC), and more.

Hypori’s program gives partners a strong foundation to capture the growing demand for BYOD — delivering a virtual workspace at up to 50% lower cost than corporate device programs, securing enterprise data by keeping it off endpoints entirely, and expanding market opportunities across federal, healthcare, financial, and enterprise mobility sectors.

The Hypori Partner Program delivers the tools and support needed to accelerate growth, including deal registration, co-marketing opportunities, sales playbooks, enablement content, and competitive incentive structures. With flexible deployment options across SaaS and on-prem, partners can build profitable, repeatable revenue streams and bring secure BYOD mobility to customers faster than ever.

To learn more about Hypori’s Partner Program or to become a trusted partner, visit https://www.hypori.com/partners.

Richmond, VA mental health service notifies 113,000+ people of data breach

Posted in Commentary with tags on December 17, 2025 by itnerd

Comparitech has reported that The Richmond Behavioral Health Authority in Virginia has notified 113,232 people of a September 2025 data breach, according to the US Department of Health and Human Services.

Rebecca Moody, Head of Data Research at Comparitech, commented: 

“While ransomware attacks have increased by 27 percent this year (rising from 2,865 in 2024 to 3,637 in 2025 to date), US healthcare providers haven’t seen the same influx. In fact, as it stands, it looks as though attacks in 2025 (280 noted so far) will be similar to 2024’s level (294 noted in total). Average ransom demands on this sector have also declined, dropping from $881,500 across the 294 noted in 2024 to $452,900 across the 280 noted so far this year.

Nevertheless, this latest breach notification from Richmond Behavioral Health Authority serves as a reminder that, even though the healthcare sector may be getting a small reprieve from ransomware gangs, the effects of these attacks when they do happen are no less significant. It also highlights how gangs are increasingly focused on data theft as part of their attacks. Qilin alone is responsible for 10 known data breaches following ransomware attacks on US healthcare providers this year with over 409,000 records breached in total.”

Once again, health care is the victim of a ransomware attack. The madness needs to stop with this sector. Though I could copy and paste that for education and government who are equally as vulnerable.