top of page
All Posts


How MSPs Can Capitalize on CMMC: Packaging, Selling, and Delivering Compliance Readiness Services
The Cybersecurity Maturity Model Certification (CMMC) is no longer just a government initiative — it’s a business opportunity. As the DoD begins enforcing CMMC 2.0 across contracts in 2025, thousands of small and mid-sized contractors will need help reaching and maintaining compliance. This creates a massive opportunity for Managed Service Providers (MSPs) to step in. MSPs already manage IT infrastructure, patching, access control, and endpoint protection. With the right part

Max Heinemann
1 day ago3 min read


What the November 10 CMMC Deadline Means for Defense Contractors
The Department of Defense’s CMMC enforcement begins November 10, 2025. Learn what this milestone means, how it affects contractors, and how Cyberleaf’s four-phase approach helps you achieve compliance efficiently and at scale. The CMMC Rule Becomes Real On November 10, 2025, the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program moves from policy to practice. Beginning this date, contracting officers can start including CMMC requirements in new

Max Heinemann
3 days ago2 min read


Ransomware Has Evolved. AI is the New Weapon
A discovery by Anton Cherepanov, a researcher at ESET, has revealed what may be the first AI-powered ransomware variant, codenamed PromptLock . This aligns with predictions that generative AI would be used this year to facilitate malicious scripts and exploits. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real time. The open-weight language model was released by OpenAI e

Adam Sewall
Sep 22 min read


HB 96 Ushers in a New Era of Cybersecurity for Ohio
When Governor Mike DeWine signed Ohio House Bill 96 into law on June 30, 2025, it set the stage for a major shift in how local...

Max Heinemann
Aug 134 min read


How One Missing Control Cost Hamilton $18.3 Million
On February 25, 2024, the City of Hamilton, Ontario experienced a cyberattack that disabled roughly 80 percent of its network and...

Adam Sewall
Aug 51 min read


What’s Changed in Scattered Spider’s Tactics, Techniques & Procedures (TTPs)
Allianz, Aflac, Caesars, MGM Resorts, Twilio, Snowflake customers, M&S, Co-Op, Harrods, Victoria's Secret, Philadelphia Insurance, Erie...

Adam Sewall
Aug 41 min read


Aeroflot Airlines’ IT Infrastructure Destroyed in Year-Long Attack
Russia’s Aeroflot, one of the world’s oldest airlines, has been left scrambling after pro-Ukraine hackers claimed to have “completely...

Adam Sewall
Jul 311 min read


Waterleaf International Announces Appointment of Dave Burg to Board of Directors
Waterleaf International, LLC (Waterleaf) is pleased to announce the recent appointment of Dave Burg as its newest board member....
mheinemann1
Jul 172 min read


Red Team Perspective: Turning AI Agents Into the Next Initial Access Vector
AI agents are software systems that leverage artificial intelligence and natural language processing to perform complex tasks on behalf...
Jason Moulder
Jul 88 min read


Waterleaf International Names Cory Brasel as Chief Product Officer
FORT MYERS, FL, UNITED STATES, June 26, 2025 / EINPresswire.com / -- Waterleaf International, LLC (Waterleaf) is pleased to announce the...
mheinemann1
Jun 262 min read


Cyber Repercussions from the Iran Conflict: What Businesses and MSPs Need to Know
As military tensions escalate between the U.S., Israel, and Iran, another battlefront is emerging — cyberspace. On June 21, coordinated...
mheinemann1
Jun 242 min read


Waterleaf International Names Jeff Buss as President & Chief Executive Officer
FORT MYERS, Fla., June 17, 2025 - Waterleaf International, LLC (Waterleaf) is pleased to announce the recent appointment of Jeff Buss as...
mheinemann1
Jun 173 min read


Fortify Your Critical Infrastructure: Advanced Security Testing for IoT, OT, and ICS Deployments
Enhanced Security for IoT, OT, and ICS Deployments can be accomplished with device and network security testing, including breach and...
mheinemann1
Apr 292 min read


Is Zero Trust Becoming the New “Compliance Checkbox”?
How Overselling Zero Trust Risks Complacency—and What We Can Do About It Zero trust has become one of the most talked-about concepts in...
mheinemann1
Apr 253 min read


HURRICANE MILTON PREPAREDNESS
ADVISORY NOTICE – ALL CYBERLEAF CUSTOMERS RE: Cyberleaf Preparation for Hurricane Milton Operations We hope this message finds you safe...
Taylor Treese
Oct 9, 20241 min read


Hunting the Hidden Enemy: Leveraging Advanced Threat Intelligence for Proactive Defense
By Taylor Treese In today’s complex and ever-evolving threat landscape, traditional security measures often fall short of protecting...
Taylor Treese
Sep 19, 20245 min read


Cybersecurity for Private Equity: Protecting and Enhancing Value
By Taylor Treese The private equity landscape is evolving rapidly , with cybersecurity emerging as a critical factor in both risk...
Taylor Treese
Jul 30, 20244 min read


Beyond EDR, MDR & XDR: Building a Fortress, Not Just a Gate
By Taylor Treese Imagine this: A thief attempts to rob a bank. They try the front door, but it’s locked with a high-security deadbolt....
Taylor Treese
Jul 18, 20244 min read
The Future of Cybersecurity Compliance: How MSPs Can Stay Ahead of the Curve
The world of cybersecurity is a constant race against evolving threats and ever-changing regulations. As Managed Service Providers...
Taylor Treese
Jul 12, 20243 min read
Technical Analysis of Anatsa: An Android Banking Malware Active in the Google Play Store
Have an Android phone? Well, the Anatsa malware aka TeaBot, a known Android banking malware, targets applications from over 650+...
Taylor Treese
Jun 4, 20241 min read
bottom of page
