Blog

News and articles about IT technology

22 May 2026·5 min read

Cisco CVSS 10.0 Vulnerability: Urgent Patch for Secure Workload REST API

Cisco Secure Workload had a critical CVSS 10.0 vulnerability. Learn about the risks, business impact, and how to protect your enterprise.

Read more
21 May 2026·6 min read

Showboat Linux Malware: Deep Dive into Telco Attacks and Enterprise Defense

Explore the Showboat Linux malware, its SOCKS5 backdoor, and advanced post-exploitation capabilities. Understand risks for telcos and effective enterprise cybersecurity strategies.

Read more
21 May 2026·5 min read

Incomplete Patches Bypass MFA on SonicWall VPNs: A Critical Risk for Enterprises

Hackers exploit incomplete patching of SonicWall VPNs to bypass MFA, opening paths to ransomware. Harden remote access, lifecycle management, and SOC/MDR with ITCS VIP.

Read more
19 May 2026·4 min read

GitHub Actions supply chain attack: hardening CI/CD pipelines

How tag redirection on popular GitHub Actions can steal CI/CD credentials—and what to do about pinning, secrets, runner hygiene, and DevSecOps controls.

Read more
18 May 2026·3 min read

Critical alert: active exploitation of NGINX CVE-2026-42945 - worker crashes and constrained RCE risk

CVE-2026-42945 in NGINX Plus/Open under active attack (CVSS 9.2): reliable worker DoS and narrower RCE prerequisites. Patch fast, verify versions, and harden with ITCS VIP.

Read more
15 May 2026·3 min read

Critical Cisco SD-WAN zero-day (CVE-2026-20182): authentication bypass with admin impact

Cisco Catalyst SD-WAN CVE-2026-20182 under active exploitation: pairing flaw, attacker playbook, IOC hunting, patching. Plan your remediation before exposure widens.

Read more
14 May 2026·4 min read

Europe and digital sovereignty: impact on businesses and cloud

The EU’s push toward technology sovereignty—with Microsoft, Google, and Amazon in the spotlight—has real implications for security, compliance, and enterprise cloud architectures.

Read more
13 May 2026·3 min read

Critical Exim flaw with GnuTLS: is your Linux mail server exposed?

CVE-2026-45185 (“Dead.Letter”) can enable remote code execution when Exim uses GnuTLS during BDAT handling. Here’s what it means for Linux MTAs and how to respond.

Read more
12 May 2026·5 min read

Offensive AI and a zero‑day 2FA bypass: a sharp turn in real‑world cyber risk

Google’s GTIG ties a mass‑exploitation zero‑day that bypassed 2FA to strong AI‑assistance signals. What it means for enterprises—and how ITCS VIP helps you respond.

Read more
11 May 2026·4 min read

Critical Ollama flaw: remote memory leak and enterprise LLM risk

CVE-2026-7482 (Bleeding Llama) can let unauthenticated remote attackers leak the full Ollama process memory—think API keys and prompts—across an estimated 300k+ exposed servers. Here is what to do next.

Read more
8 May 2026·4 min read

Critical PAN-OS flaw: root access and corporate espionage risk

CVE-2026-0300 in PAN-OS under active attack—buffer overflow in the User-ID Authentication Portal, perimeter impact, and immediate mitigations before patches land.

Read more
7 May 2026·4 min read

xlabs_v1 Mirai-style botnet: IoT via exposed ADB and DDoS risk

How xlabs_v1 builds on Mirai to weaponise IoT gear through exposed Android Debug Bridge and large-scale DDoS—and what enterprises should prioritise.

Read more
6 May 2026·3 min read

Public Verification of Android Apps: Defences Against Supply Chain Attacks

Google is expanding binary transparency for Android apps—a critical step against supply chain attacks. We review the risks and practical options for mobile security.

Read more
29 November 2024·3 min read

How to avoid chaos in your SQL Server databases

Effective maintenance and practical solutions. SQL Server databases are fundamental for many businesses, managing key information in […]

Read more
27 November 2024·2 min read

How to optimise your network with VLAN configurations on switches

Reliable enterprise networking depends on efficient traffic segmentation—and that is where […]

Read more
25 November 2024·2 min read

Effective Fixes for NAS Enclosure Disk Errors

NAS (Network Attached Storage) enclosures are an efficient solution for centralised storage on business and home networks. However […]

Read more
20 November 2024·3 min read

Inbound marketing and automation: how to attract, convert, and retain customers

In digital marketing, our relationship with customers has evolved. It is no longer only about direct sales […]

Read more
13 November 2024·3 min read

Data-driven marketing 2.0: how to make smarter decisions with data

What is data-driven marketing 2.0? Data-driven marketing 2.0 is the next phase in using data in marketing, […]

Read more
11 November 2024·2 min read

The impact of SEO on digital marketing

Key strategies for IT companies in Spain. In the previous article we looked at the role of digital marketing in IT […]

Read more
6 November 2024·3 min read

Personalisation in IT marketing: techniques to create unique customer experiences with clienting

In today’s competitive environment, delivering personalised experiences has become a crucial advantage, especially in the […]

Read more
1 November 2024·2 min read

Transforming data management in healthcare with tailored IT solutions

In healthcare, data management is essential not only to improve patient care but also to meet security and data privacy […]

Read more
30 October 2024·2 min read

Implementing DevOps in SMEs

In an increasingly competitive, digitalised business world, small and medium-sized enterprises (SMEs) are constantly looking for ways to […]

Read more
28 October 2024·2 min read

How AI and automation are transforming IT services for SMEs

Small and medium-sized enterprises (SMEs) face the challenge of keeping up with technology without the resources of large […]

Read more
25 October 2024·3 min read

How to Prepare Your Business for the Future

What is digital transformation? Digital transformation is a deep, strategic process in which a business embeds digital technologies across every level […]

Read more
23 October 2024·3 min read

NIST vs NISTv2: why your organisation should adopt these security frameworks

The National Institute of Standards and Technology, better known as NIST, is an agency of the US Department of Commerce that has established […]

Read more
21 October 2024·3 min read

Total Protection in the Cloud

End-to-end security and backups with ITCS VIP. At ITCS VIP, we are committed to delivering the best protection and […]

Read more
18 October 2024·2 min read

Acronis Cyber Protect: the end-to-end solution for cybersecurity and data protection in 2024

Acronis Day 2024 was the ideal setting to highlight the power of Acronis Cyber Protect, a solution that uniquely integrates […]

Read more
16 October 2024·2 min read

Innovation and security: MSP Global 2024 with LastPass, Nutanix, Uptime, and NVIDIA

MSP Global 2024 brought together leaders from the managed services sector and innovative technology companies such as LastPass, Nutanix, […]

Read more
14 October 2024·2 min read

MSP Global 2024 and Acronis Day: connecting with the future of technology

The technology services industry is constantly evolving, and attending events such as MSP Global 2024 and […]

Read more
11 October 2024·2 min read

What is virtual machine migration?

Virtual machine (VM) migration is a key process in modernising IT infrastructure. It involves moving a virtual machine from one server or […]

Read more
9 October 2024·2 min read

Implementing Linux in development and production environments

Linux is a key platform for developers and IT professionals—not only as an operating system but as a complete environment […]

Read more
7 October 2024·6 min read

Linux: The operating system redefining technology

Since its creation in 1991 by Linus Torvalds, Linux has evolved to become one of the most influential operating systems in the […]

Read more
3 October 2024·3 min read

Advanced use cases in the automation journey

The convergence of smart contracts and information technology (IT) has created a new paradigm of automation and security in digital […]

Read more
30 September 2024·2 min read

The relationship between IT and smart contracts

In today’s digital transformation landscape, smart contracts are revolutionising how companies manage agreements and transactions. […]

Read more
27 September 2024·3 min read

New big data trends and their impact on technology innovation

In the first part of our article we explored how big data has transformed technology services, enabling process optimisation, improved security, […]

Read more
23 September 2024·3 min read

How big data impacts technology services

The term big data has gained major importance, especially in technology services. The volume of data we generate every day is enormous, and […]

Read more
19 September 2024·4 min read

Creative ideas in technology services marketing

Creativity is the foundation of a successful marketing strategy, especially in the technology services industry, where […]

Read more
16 September 2024·4 min read

Marketing in the technology services industry

In the world of technology services, marketing plays a crucial role in standing out from competitors, winning new clients, and strengthening […]

Read more
12 September 2024·4 min read

Cybersecurity Trends in Spain for 2025

Cybersecurity remains a core priority in Spain. In 2025, the rise in cyber attacks, new regulations, and […]

Read more
9 September 2024·3 min read

New email security measures: Part 2

In the first part of this article we looked at key technologies such as mail gateways, antispam filters, DKIM, and SPF, which are essential […]

Read more
5 September 2024·3 min read

Drawbacks of mail gateways, antispam filters, and DKIM: what should you do?

Email remains one of the most widely used tools for both businesses and individual users. However, with widespread use, the volume of spam and […]

Read more
2 September 2024·3 min read

VPN Connectivity Issues and How to Fix Them

Today, in the current digital environment, virtual private networks (VPNs) have become an essential tool for businesses seeking to secure […]

Read more
29 August 2024·2 min read

How to resolve firewall security issues

In today’s digital world, firewalls are the first line of defence for network infrastructure. […]

Read more
26 August 2024·2 min read

The Venn diagram

In today’s digital era, marketing has evolved beyond simple advertising and promotions. It has become a data-driven discipline […]

Read more
12 August 2024·2 min read

Major Cyber Threats and How to Defend Against Them

In the digital age, cybersecurity matters more than ever. Cyber threats are constantly evolving and can have devastating consequences […]

Read more
29 July 2024·2 min read

What hackers want: motivations and goals

In the digital age, online security concerns everyone. Hackers, also known as cybercriminals, are a constant threat to the integrity of […]

Read more
15 July 2024·1 min read

Extend the Life of Your Hardware

IT maintenance is essential to keep your devices and systems running reliably without interruption. By anticipating problems, you can avoid data […]

Read more
27 June 2024·4 min read

Digital sustainability

In 2024, digital sustainability has become a central priority for technology and IT services companies. […]

Read more
13 June 2024·4 min read

Cybersecurity: More crucial than ever

As cyber threats grow, security remains a top priority in 2024. Cybersecurity techniques are evolving rapidly, with approaches such as artificial […]

Read more
30 May 2024·3 min read

Quantum computing: the next great leap

Although still in its early stages, quantum computing is beginning to show its potential to solve complex problems that would be […]

Read more
16 May 2024·3 min read

Artificial intelligence and machine learning

Artificial intelligence (AI) and machine learning (ML) have come a long way from their early days, when they were mainly tools to automate […]

Read more
2 May 2024·4 min read

5G and 6G networks: Ultra-fast connectivity

Global rollout of 5G technology continues in 2024, delivering ultra-fast connection speeds and low latency. But 6G is already […]

Read more