Select Page

MSP Dispatch is your source for news, community events, and commentary in the MSP channel.  

Hosted by: Tony Francisco and Ray Orsini

Give us your feedback by emailing news@mspmedia.tv   

In this episode of MSP Dispatch we touch on OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations, A New Chat Bot Is a ‘Code Red’ for Google’s Search Business and Microsoft-Signed Malicious Windows Drivers Used in Ransomware Attacks.

Story Links: 

Notable Mentions:

Community Events:

  • 12/28 @ 12:00 pm ET | Build It Better MSP Discussion Presented by Everything MSP
  • 12/29 @ 6:30 pm ET | The Tech Bar Podcast Ep. 49
  • 12/30 @ 10:00 am ET | MSP Dispatch Week Wrap Up Presented by The MSP Media Network

Connect with our hosts:  

– Tony Francisco: https://www.linkedin.com/in/tonyjfrancisco/

– Ray Orsini: https://www.linkedin.com/in/rayorsini/ 

Connect with our featured guest:

Be sure to follow us on social media:  

Facebook: https://www.facebook.com/mspmediatv/

Twitter: https://twitter.com/mspmediatv

LinkedIn: https://www.linkedin.com/company/mspmediatv/

Instagram: https://www.instagram.com/mspmediatv   

Reddit: https://www.reddit.com/r/mspmedia

Discord: https://discord.gg/Hc7b55cJPF

TikTok: https://www.tiktok.com/@mspmediatv 

0:00 Teaser

1:03 Intro/Banter

4:58 OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations

14:39 A New Chat Bot Is a ‘Code Red’ for Google’s Search Business

21:33 Microsoft-Signed Malicious Windows Drivers Used in Ransomware Attacks

26:51 Notable Mentions

28:28 Community Events

29:35 Sign-off

31:12 Outtakes