Barracuda Spam Filtering

Barracuda Spam Filtering

eScan confirms update server breached to push malicious update

Quick Note MspPortal Partners could have solved issue
With only 2 products
1) Bitdefender (mdr)
2) Barracuda (Total Mail Protection)

Article:
MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious to a small subset of customers earlier this month.

The file was delivered to customers who downloaded updates from the regional update cluster during a two-hour window on January 20, 2026.
Scan says the affected infrastructure has since been isolated and rebuilt, authentication credentials have been rotated, and remediation has been made available to impacted customers.

Security firm Morphisec separately published a technical report analyzing malicious activity observed on customer endpoints, which it associates with updates delivered from eScan’s update infrastructure during the same timeframe.

Morphisec states that it detected malicious activity on January 20, 2026, and later contacted eScan. MicroWorld Technologies told BleepingComputer it disputes Morphisec’s claims that it was the first to discover or report the incident.

According to eScan, the company detected the issue internally on January 20 through monitoring and customer reports, isolated the affected infrastructure within hours, and issued a security advisory on January 21. eScan says Morphisec contacted the company later, after publishing public claims about the incident.

eScan also disputes claims that affected customers were unaware of the issue, stating that it conducted proactive notifications and direct outreach to impacted customers while remediation was being finalized.
Article (https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/amp/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor:
Bitdefender , Barracuda
“Where Service and Technical Skills Count”

Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware and More

Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware
By
Tushar Subhra Dutta –
January 21, 2026

A large-scale campaign is turning a trusted Windows security driver into a weapon that shuts down protection tools before ransomware and remote access malware are dropped.

The attacks abuse truesight.sys, a kernel driver from Adlice Software’s RogueKiller antivirus, and use more than 2,500 validly signed variants to quietly disable endpoint detection and response (EDR) and antivirus solutions across Windows systems.

The threat first gained wider attention when Check Point researchers exposed how attackers were abusing legacy driver signing rules to load pre-2015 signed drivers on modern Windows 11 machines.

By doing so, they could run the vulnerable TrueSight driver with full kernel privileges, even though Microsoft’s own security controls were meant to block risky drivers. The result is a reliable way to kill security tools before any payload is delivered.

Soon after this activity surfaced, MagicSword analysts noted that the driver abuse had already spread across multiple threat groups and regions, with fresh driver variants appearing week after week.

Their telemetry showed that financially motivated actors and advanced persistent threat (APT) groups were all adopting the same method to clear the way for ransomware and remote access trojans on compromised hosts.

Article (https://cybersecuritynews.com/hackers-weaponized-2500-security-tools/)

Zendesk ticket systems hijacked in massive global spam wave
By Lawrence Abrams
January 21, 2026 06:46 PM
Article
(https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam-wave/)

​Information technology giant Ingram Micro has revealed that a ransomware attack on its systems in July 2025 led to a data breach affecting over 42,000 individuals.

Ingram Micro, one of the world’s largest business-to-business service providers and technology distributors, has over 23,500 associates, more than 161,000 customers, and reported net sales of $48 billion in 2024.

Ingram Micro says ransomware attack affected 42,000 people

In data breach notification letters filed with Maine’s Attorney General and sent to those affected by the incident, the company said the attackers stole documents containing a wide range of personal information, including Social Security numbers.
By Sergiu Gatlan
January 19, 2026 08:33 AM

Article
(https://www.bleepingcomputer.com/news/security/ingram-micro-says-ransomware-attack-affected-42-000-people/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda
“Where Service and Technical Skills Count”

 

## **MspPortal Partners Steps Up with Premier Security Solutions for MSPs**

**MspPortal Partners** is proud to continue serving as a trusted distributor of industry-leading security software at **wholesale prices** exclusively for Managed Service Providers (MSPs), both small and large. We do **not** sell direct to end users — our commitment is to empower **tech firms** with the best tools at the best value.

We’re not here to buy your business — our **aggressive pricing** and **expert service** speak for themselves.

### 🛡️ **Barracuda Email Security — Three Wholesale Tiers**

**1) Advanced Email Protection**

* Combines secure email gateway with AI-powered threat detection
* Protects against **13+ email threat types**
* Includes **post-delivery threat remediation**

**2) Complete Mail Protection**

* Includes all features of Advanced
* Adds **cloud backup** for **Microsoft 365 and Google Workspace (Gsuite)** components
* Backup occurs **off-platform** for enhanced redundancy

**3) Total Mail Protection**

* Includes everything from Complete
* Adds **lateral attack protection** across Microsoft 365 apps
* Includes full **data recovery and restore capabilities**

### 🖥️ **RMM – Remote Monitoring and Management**

We provide Remote Management tools (RMM) designed for proactive IT monitoring. This includes:

* Real-time system status tracking
* Automated remediation
* Efficient **remote device management**
* Reduces the need for on-site support

### 🔐 **Bitdefender — Elite Endpoint Security Solutions**

MspPortal Partners offers **multiple wholesale tiers** for Bitdefender, the global cybersecurity leader. Our customers report **superior performance** to platforms like **CrowdStrike** and **SentinelOne**.

**Available for**:

* Small Businesses
* Midsize Firms
* Enterprise Environments

**Core Features**:

* **GravityZone Platform**: Instantly scalable endpoint protection
* Compliance-ready: Supports **PCI DSS**, **NIS2**, **HIPAA**
* Simple integration with powerful reporting
* Multi-layered defense — next-gen AV, EDR, and behavioral analytics
* MDR — next-gen AV, EDR, and behavioral analytics managed 24x7x365 by humans and AI with alerts

### 🛠️ **Support & Training That Sets Us Apart**

We offer up to **Level 3 support**, plus **in-depth training** — a rarity in wholesale distribution.

* **24x7x365 support** always available
* **Phone support** available **Monday–Friday, 7:30 AM to 5:00 PM MST/Arizona** — and yes, **we actually pick up the phone**.

### 👤 **Contact**

**Roy Miehe**
CEO/President, MspPortal Partners Inc.
Security Software Distributor: **Bitdefender**, **Barracuda**, **Axcient**
*“Where Service and Technical Skills Count”*

CISA Warns of Hurricane-Related Scams

CISA Warns of Hurricane-Related Scams
09/25/2024 08:00 AM EDT

CISA encourages users to review the following resources to avoid falling victim to malicious cyber activity:

1) Federal Trade Commission’s Staying Alert to Disaster-related Scams and Before Giving to a Charity,

2) Consumer Financial Protection Bureau’s Frauds and scams, and

3) CISA’s Phishing Guidance, Stopping the Attack Cycle at Phase One to help organizations reduce likelihood and impact of successful phishing attacks.

MspPortal Partners provides a solution  that works with the Fortune 500 firms (PhishingBox) the best in the business.
If you are a partner with MspPortal Partners we will set up a full admin panel so you can protect your clients.

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Phishing Simulation & Cyber Security Training
“Where Service and Technical Skills Count”

Continued from July 19th 3 Cause’s of the Crowdstrike down in reality

Keep in mind this is my personal opinion..please prove me wrong if you can.

3 Cause’s of the CrowdStrike down
1) Bad Developer file uploaded/downloaded
2) Microsoft Software runs the operating systems sort of like a monopoly, we all know it in reality it is.
3) Distribution of software via Cloudflare

Keep in mind this is my personal opinion..please prove me wrong if you can.

I read something today that shocked me. CloudStrike was going pay techs globally $10.00 coffee vouchers to remove sys file issue. I work with four hundred plus tech firms through out the US I have never heard of a computer Tech working for a $10.00 coffee voucher.
Normal Tech rates run from entry level $50.00 to $500.00 a hour.

(Bloomberg) — Microsoft Corp. said Delta Air Lines Inc. turned down repeated offers for assistance following last month’s catastrophic system outage, echoing claims by CrowdStrike Holdings Inc. in an increasingly contentious conflict between the carrier and its technology partners.
Now I am not a strong proponent of Ed Bastien (to full of himself) nor do I fly Delta.

If read/sift through all the garbage it really was all 3 firms that caused the outage.
No matter what OS Delta was running, Windows, Apple, Linux, The Falcon Platform runs on all 3. So in my opinion Delta does deserve the money for the down time.

Even thou in my opinion Mark S Cheffo when :“Even though Microsoft’s software had not caused the CrowdStrike incident, Microsoft immediately jumped in and offered to assist Delta at no charge,” I did not hear they were going to fly Techs to fix all Delta’s machines, for that matter globally let alone Delta

When does a end user or SMB company ever able to talk to Microsoft Support and receive a response within a reasonable amount of time?

So right now I see 2 parties at fault (Microsoft & CroudStrike)
But there is a 3rd party involved, CloudFlare, have you ever asked yourself what they do:Protecting it from online threats and optimizing performance there web Site.

Cloudflare is a company that provides services like content delivery network (CDN), cloud cybersecurity, DDoS mitigation, Domain Name Service (DNS), and domain registration. They help improve website speed, security, and reliability by acting as a mediator between a website’s server and its visitors, protecting it from online threats and optimizing performance.

Cloudflare
American internet infrastructure and website security company
cloudflare.com

Cloudflare, Inc. is an American company that provides content delivery network services, cloud cybersecurity, DDoS mitigation, Domain Name Service, and ICANN-accredited domain registration services. Cloudflare’s headquarters are in San Francisco, California. According to The Hill, Cloudflare is used by more than 20% of the Internet for its web security services, as of 2022. Wikipedia

Now all this is my opinion but should help create and finish a Class Action Law Suit, all 3 need to named as defendants.

Last Pay Your developers and Tech Support folks more money, Take it out of the C-Levels paychecks/bonuses. It appears that most firms have forgotten with out staff the company would be nothing.

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Phishing Simulation & Cyber Security Training
“Where Service and Technical Skills Count”

Celebrating Barracuda’s 2024 CRN Women of the Channel winners

MspPortal Partners Inc is a large partner of Barracuda and does large investments in tech firms for it 400 plus MSP partners from the East Coast to the West Coast Alaska and Canada service over 4000 companies amongst the 400 plus partners.

Congrats to the ladies below..But in my opinion they failed to mention 2 ladies that are part of the glue that keeps Barracuda alive

Both these ladies are the glue that  run and mange support teams and staff inside the Barracuda organization (West Coast and East Coast)

Kris Louie and Ginger Janukaitis, they both run the folks who answer the phones for support calls and informs the staff who to direct the calls to if need depending the nature of the support call

Today, CRN announced its highly respected Women of the Channel list for 2024. We’re excited to share that a total of six Barracuda team members made the list!

This annual award highlights a list of women who have made significant strides in their respective fields and at their organizations, underscoring their leadership and dedication to promoting continuous innovation and success. This year, six of our very own female leaders have been featured on the list. The honorees include:

Maria Martinez, VP of Channels, North America

Karen Ward, Regional VP, MSP Sales, Americas, Barracuda MSP

Lindsay Faria, Senior Director, MSP Marketing, Americas, Barracuda MSP

Jenna Renaud, Director of National Accounts

Alli Oneal, Senior Manager, Global Partner Programs & Partner Experience

Aisha Eugene, Senior Manager, Partner Enablement, Barracuda MSP

To help get a sense of their roles and responsibilities, we asked these six women about some of their channel-related accomplishments over the last year as well as a few goals that they have for our channel business in the coming months.

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Phishing Simulation & Cyber Security Training
“Where Service and Technical Skills Count”

Action required: 90-day notice – Barracuda DMARC policy Must Read Please

Barracuda Networks, Inc. is taking steps to harden our email-sending domains by moving our DMARC policy into an enforcement configuration. 
 
This important measure will prevent the potential threat of an adversary looking to impersonate Barracuda. As we implement this control, we advise all our customers to change their notification email address and the SMTP server setting on their Barracuda appliance(s) to use their domain/email address instead of ‘barracuda.com‘. Doing this will ensure your email provider accepts your notification emails from your Barracuda appliance.  
 
Please note this is a 90-day notice that we plan to enforce our DMARC policy. If you have not moved to the new product version that supports this change by July 19, 2024, your product (see list below) will no longer be supported. 
 
Below are articles to assist in making these changes to your Barracuda appliances where Barracuda DMARC policy will be enforced, please click on the one(s) that are relevant to you or locate them on Barracuda Campus by searching for “DMARC.”  
 
 
 
 
 
 
 
 

 

Please note, if you have not moved to the new version by July 19, 2024 your product will no longer be supported.  

 
We greatly appreciate your cooperation in this matter to improve your security posture and reduce potential email impersonation attacks. 
 
If you have questions or need assistance, please reach out to the support team at support@barracuda.com.

 
 
Thank you! 
 
TheBarracudaTeam

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor: Bitdefender , Barracuda, Phishing Simulation & Cyber Security Training

“Where Service and Technical Skills Count”

CISA Issues Emergency Directive 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System

CISA Issues Emergency Directive 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System

04/11/2024 02:15 PM EDT

Today, CISA publicly issued Emergency Directive (ED) 24-02 to address the recent campaign by Russian state-sponsored cyber actor Midnight Blizzard to exfiltrate email correspondence of Federal Civilian Executive Branch (FCEB) agencies through a successful compromise of Microsoft corporate email accounts. This Directive rhttps://www.cisa.gov/news-events/directives/ed-24-02-mitigating-significant-risk-nation-state-compromise-microsoft-corporate-email-systemequires agencies to analyze the content of exfiltrated emails, reset compromised credentials, and take additional steps to secure privileged Microsoft Azure accounts.

While ED 24-02 requirements only apply to FCEB agencies, other organizations may also have been impacted by the exfiltration of Microsoft corporate email and are encouraged to contact their respective Microsoft account team for any additional questions or follow up. FCEB agencies and state and local government should utilize the distro MBFedResponse@Microsoft.com for any escalations and assistance with Microsoft. Regardless of direct impact, all organizations are strongly encouraged to apply stringent security measures, including strong passwords, multifactor authentication (MFA) and prohibited sharing of unprotected sensitive information via unsecure channels.

Article (https://www.cisa.gov/news-events/alerts/2024/04/11/cisa-issues-emergency-directive-24-02-mitigating-significant-risk-nation-state-compromise-microsoft)

Folks be smart get off O365 they are compromised ever since they were invefected by solarwinds a leaking timebomb

2020 was a roller coaster of major, world-shaking events. We all couldn’t wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century.

The SolarWinds hack was a major event not because a single company was breached, but because it triggered a much larger supply chain incident that affected thousands of organizations, including the U.S. government.

Suggestion at least use our malware protection products (Like Mail Protection to start off with)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Phishline Training
“Where Service and Technical Skills Count”

FTC: Americans lost $1.1 billion to impersonation scams in 2023

By Bill Toulas April 1, 2024 12:03 PM

At MspPortal Partners Inc we/partners can train your employees for Work and Home. With our # 1 Mail Protection and Phishing Education rated and used by the top 500 firms.

“Many scammers impersonate more than one organization in a single scam – for example, a fake Amazon employee might transfer you to a fake bank or even a fake FBI or FTC employee for fake help.”

The top Five scam types FTC highlights are:

1) Copycat Account Security Alerts: Scammers send fake alerts about unauthorized account activity, tricking victims into transferring funds for protection.
Phony Subscription Renewals: Emails claim a subscription you never had is renewing, coaxing you into a refund scam that involves returning over-refunded amounts via gift cards.

2) Fake Giveaways, Discounts, or Money to Claim: Scams offer bogus discounts or giveaways from known brands, leading victims to buy gift cards or send money to claim the non-existent offers.

3) Bogus Problems with the Law: Impersonators claim you’re implicated in a crime, pushing you to move money or buy gift cards under the guise of resolving the issue.

4) Phony Subscription Renewals: Emails claim a subscription you never had is renewing, coaxing you into a refund scam that involves returning over-refunded amounts via gift cards.

5) Made-up Package Delivery Problems: Fraudulent messages from carriers about delivery issues, aiming to steal credit card information or account details under the pretense of resolving a delivery problem.

The agency provides tips for consumers to protect against this type of fraud, which include avoiding clicking on URLs arriving via unsolicited communications, distrusting requests for money transfers, and taking the time to verify suspicious communications.

148,0000 Phone Calls
120,0000 Phishing Emails
65,000 Text Messages
45,000 Other Methods

Article (https://www.bleepingcomputer.com/news/security/ftc-americans-lost-11-billion-to-impersonation-scams-in-2023/)

Roy Miehe | MspPortal Partners Inc. | Ceo/President
Security Software Distributor: Bitdefender , Barracuda, Phishline Training
“Where Service and Technical Skills Count”

Lock up inbound mail From

If you use Barracuda with MspPortal Partners do the following if you have not already done so

 

Article
(https://campus.barracuda.com/product/emailgatewaydefense/doc/96023036/email-gateway-defense-ip-ranges)

Customers Using the Following Instances of Email Gateway Defense
Network Traffic to Email Gateway Defense (SMTP) Network Traffic from Email Gateway Defense (SMTP and other)
Australia (AU) 3.24.133.128/25 3.24.133.128/25
Canada (CA) 15.222.16.128/25 15.222.16.128/25
Germany (DE)

35.157.190.224/27

18.185.115.192/26

18.184.203.224/27
35.157.190.224/27
United Kingdom (UK)

35.176.92.96/27

18.133.136.128/26

18.133.136.96/27
35.176.92.96/27
United States (US)

209.222.80.0 / 21
64.235.144.0 / 20

209.222.80.0/21
Ensure Connectivity and Redundancy

Follow these tips to ensure connectivity and redundancy:

Open your firewall ports to allow the IP address ranges, based on your Barracuda Networks instance.
(Optional) Configure your mail server or router to block inbound email not originating from your Email Gateway Defense IP address ranges.
If you have a Barracuda Web Security Gateway or Barracuda Web Application Firewall: You might need to exempt ess.barracudanetworks.com from filtering.
Exempt traffic coming from Email Gateway Defense IP addresses from any kind of throttle or rate controls, RBL, and SPF or DKIM scanning.

 

Roy Miehe | MspPortal Partners Inc. | Ceo/President

Security Software Distributor: Bitdefender , Barracuda, Axcient

“Where Service and Technical Skills Count”