
Every year, security vendors publish threat reports. Most say variations of the same thing. But Barracuda’s Managed XDR Global Threat Report stands out for a reason that matters to MSPs: it’s built on operational data from a managed SOC that protects the kinds of organizations MSPs actually serve. More than two trillion IT events. Nearly 600,000 security alerts. Over 300,000 protected endpoints, firewalls, servers, and cloud assets. This isn’t a survey of sentiment. It’s a record of what actually happened.
Merium Khalid, director of SOC offensive security at Barracuda, joins the podcast to walk through the findings. The headline stat — that 90 per cent of ransomware incidents exploited firewalls through unpatched vulnerabilities or compromised accounts — sets the tone, but the conversation goes deeper, including why the most commonly detected vulnerability dates back to 2013.
Merium explains how attackers are abusing the same tools MSPs rely on every day — ScreenConnect, RDP, PowerShell, and in one case, Datto RMM — to move laterally while mimicking normal IT operations. As Help Net Security noted, attackers keep finding the same gaps, and Merium makes a compelling case that the 100 per cent rogue endpoint finding is fundamentally an asset management problem that doesn’t get the attention it deserves.
We also cover the growing role of supply chain risk, with 66 per cent of incidents now involving a third party (up from 45 per cent the year before), and what that means for MSPs who are themselves the trusted third party for their clients. We close with Merium’s practical advice for resource-constrained security teams.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Spotify | Amazon Music | Android | iHeartRadio | Youtube Music | RSS
Read Full Transcript
Robert Dutt: Hello and welcome to In The Channel from ChannelBuzz.ca, bringing news and information to the Canadian IT solution provider community for the last 16 years now. I’m Robert Dutt, editor of ChannelBuzz.ca, and as always, your host for the show.
Last month, Barracuda released its Managed XDR Global Threat Report, drawing on more than 2 trillion IT events from 2025 to map how attackers are actually getting into networks and what’s making it easier for them. Some of the numbers were striking. 90% of ransomware incidents exploited firewalls. The fastest case went from breach to encryption in three hours. And every single incident the team responded to involved at least one unprotected or rogue device on the network. Today I’m sitting down with Merium Khalid, director of SOC Offensive Security at Barracuda, to dig into what the data actually means for MSPs and the customers they protect. We’re talking about why firewalls keep failing despite years of the same advice, what it looks like when attackers hide inside the legitimate tools MSPs use every day, and where the blind spots are that most organizations don’t even know they have. So let’s get right into it. My chat with Barracuda’s Merium Khalid.
Robert Dutt: Merium, thanks for joining us.
Merium Khalid: Thanks, Rob. Thanks for having me.
Robert Dutt: The report’s been out there for about a month or so, I guess. From your vantage point, running offensive security and in the SOC at Barracuda, what conversations has it sparked with MSPs and with their customers? What’s resonating and what are people still not taking seriously enough?
Merium Khalid: Yeah, great question, Rob. So in terms of the key findings, I think that’s really what the report is focusing on, and that is really what is resonating to our MSPs and our customers and our core customers, is that there is at least one rogue device involved in any of the security incidents that we’ve worked on. And what I mean by a rogue device, it’s basically a device that’s unprotected, unmonitored within your environment. So that kind of becomes like a home or a ground for the threat actor to kind of stay and go under the radar. And I think a lot of our MSPs are finding that interesting. And I think it was one of the most shocking findings as well for us too. It’s the asset management. I don’t think asset management and making sure you are aware of all the assets in your environment, I don’t think that is emphasized enough. And I think that this report kind of makes that in the forefront.
Robert Dutt: A couple of things that can certainly shape customer conversations.
Merium Khalid: Yeah, for sure.
Robert Dutt: One of the headline stats is that 90% of ransomware incidents exploited firewalls, often through old vulnerabilities. The most common detected vulnerability in the report dates back more than a decade, 2013. So this isn’t new advice, but why does this keep happening? Is it a tooling problem? Is it a process problem? Is it a human prioritization problem? Why do we keep running up against these old flaws as current foes?
Merium Khalid: I think it’s both. I think it is a human problem, resource problem, resource gap. It’s also not having proper policies in place. It’s also just the advancements with AI as well. Being able to, threat actors are using it, being able to exploit firewalls at a faster level. And essentially what’s happening here is firewall exploitation is very, very common because it is kind of the low hanging fruit in terms of it’s usually the first public-facing asset in a customer’s environment. So you have people working remotely, so they’re VPNing into their organization’s environment. They’re using some sort of SSL VPN. And SSL VPN, I found, is to be one of the biggest root causes for ransomware attacks because we don’t have the proper tools in place. So there’s no MFA in place, or maybe there is a leaked password out there on the dark web where the account is still active, so no, there isn’t proper account management. So I think it’s not one thing that you can point at like, hey, this is a root cause and this is causing all the problems. I think it’s a combination of people, process, and technology.
Robert Dutt: So if I’m an MSP and I can’t patch everything overnight, especially in multiple customers and complex environments, where should I be triaging firewall risk more intelligently?
Merium Khalid: Well, prioritizing. Prioritizing what are your critical vulnerabilities? If you have a FortiGate firewall, if you have a SonicWall firewall, and there is a zero-day out there, there’s a new vulnerability out there, that is something you want to prioritize right away. But again, you need visibility for that. You need to know that there is a vulnerability out there. So with XDR, what we do is we actually release advisories. So if there is something critical out there, we try to inform our customers as soon as possible. And we have also released a managed vulnerability service as well. So we will scan your environment for any critical or low-medium vulnerabilities and prioritize it in order and give you a report of what you need to patch and how you need to patch it. So having some sort of vulnerability scanning, quarterly, monthly, yearly is very, very important, but also having some sort of visibility as well.
Robert Dutt: In the report, the fastest ransomware case went from breach to encryption in about three hours, if I recall correctly, and 96% of incidents involved lateral movement that ended up in ransomware deployment. What does that timeline say about how realistic it is for an MSP security team to detect, contain, mitigate an attack manually?
Merium Khalid: Even the three hours, I would say, is sufficient time because you don’t want to detect a ransomware attack after the three hours. You want to detect a ransomware attack in the beginning of the attack life cycle. So in the initial act, if they’re trying to brute force your firewall or you’re seeing some sort of suspicious login within your SSL VPN, before they even start moving laterally, you want to detect that before it happens. But again, with XDR, what I think what stands out the most for us is that we have detections across each of the attack phases. So if there is lateral movement, we want to be able to detect that. If they are using some sort of remote code execution or some sort of PsExec tool or some sort of tool to move laterally across the network, we want to be able to detect that with our endpoint detection or our server monitoring. So the three hours may seem like a short time, but it’s actually not. I think most important is detecting early on. So prior to the three hours, detecting at the first phase of the attack rather than the threat actor being there and encrypting.
Robert Dutt: And those things you talked about were the earliest reliable signals that something’s going wrong, but we aren’t to the encryption point yet. Or is there another, this is the thing you should watch for first?
Merium Khalid: Yeah. I mean, again, you want to watch for early signs, right? You want to watch for any sort of privilege escalation that’s happening, any sort of logins from suspicious locations, any sort of spike in your baseline behavior, any sort of brute force activity. I think those are the early signs you want to watch for. But I think the main thing I would say is monitoring. Make sure all your assets, you have server monitoring, EDR monitoring in place. Because a lot of the times, this is actually very important to the data in the report, is these customers that did get hit with Akira or RansomHub or Cactus, they had some sort of gap in the monitoring. So they did not have the full XDR suite deployed. It’s just like protecting a house. You don’t want to just protect the front door. You want to protect the back door and the windows as well. So there was some sort of gap in the monitoring, which then led to the threat actor going undetected. So the first thing you want to do is actually make sure you are monitoring everything, that you have comprehensive monitoring across your environment. And that’ll make it a lot easier to detect the threat actor in the early phases.
Robert Dutt: One of the themes that stood out to me and something that I feel like I’m hearing a lot more recently is the theme of attackers abusing legitimate tools. ScreenConnect, RDP, PowerShell, even to your monitoring point, RMM tools in some cases. And these are tools that MSPs are invested in and living in every day. How should MSPs be thinking about what normal IT behavior looks like in their own network and on their clients’ networks?
Merium Khalid: Yeah, I think that’s a really, really good point. So when it comes to using legitimate tools, you always want to look at who is initiating the usage of a tool. Is it an admin account or is it a service account that’s dedicated to this sort of activity for their regular operations? Usually when it’s associated with some sort of admin account, that can be indicative of malicious activity, but also you want to look at activity before and after, right? So if you have brute force activity, you have privilege escalation, any sort of activity that’s not in the norm, and then you’re seeing the use of like PsExec, RMM tools, RDP, then that could indicate some sort of attack. So I think, yes, it is a kind of tricky area or a blurry area, but that’s where your intelligence and different tactics and techniques come into play, right? So threat actors are known for using these tools so they could go under the radar. But because of that, we’ve learned from all the incident response that we’ve done the different tactics and techniques that they use. So we know what to look for and we know what is suspicious and what is maybe normal business operations.
Robert Dutt: And those are the kinds of things that they should see and kind of immediately see, okay, that’s a red flag. We should drop everything and deal with this urgently.
Merium Khalid: Yeah. Yeah. And I think that’s where you want to make sure you have the right skillset and the right people in place looking at your environment, right? Maybe someone from IT might not have the knowledge or the skillset to identify something that’s malicious or normal. So it’s important to have like a 24/7 SOC in place. It’s important to have your security tools in place so you have people with the right knowledge or the right experience looking at your environment.
Robert Dutt: We touched earlier on the number about basically every incident involving at least one unprotected rogue endpoint. And also this report talked a lot about the number of attacks that had third party involvement, that was two thirds or so, up from less than half a year ago. Along the same note as the tools, MSPs themselves are a trusted third party to their clients. How should they be thinking about the risk that they themselves are introducing into the equation and the risk their clients’ other vendors are introducing, especially in situations where it’s a complex network?
Merium Khalid: Yeah. I think when you are using a vendor, or I mean, everyone is bound to use some sort of vendor or third party tool, right? I think when you are incorporating that in your environment, it’s very, very necessary to make sure you have the right legal and compliance process to make sure that they have, they are doing the best security practices. So making sure they’re SOC 2 audited, making sure they have the right policies in place. So when you’re picking a vendor, I would say, have your legal team involved, have your compliance team involved and do a very comprehensive security review before you kind of incorporate them in your environment. Because yes, like the risk is not just for your organization, the risk carries over to how well is your third party vendor actually practicing the best security practices.
Robert Dutt: For the MSP listening to this and feeling like, okay, my tools are potentially compromised, I could be introducing risks, third parties could be introducing risks. What are two or three changes that an MSP can make in what they do or how they do what they do, that would meaningfully reduce risk without blowing up their own mode of operation basically?
Merium Khalid: Yeah. Yeah. So I think when it comes to key recommendations from the report, of course, there’s a long list of things you could do, but I think what’s going to have the most impact on your environment is having an audit. So auditing all your active accounts, disabling those that are no longer in use, because as I said, that could become a home for threat actors to kind of make their ground and to move laterally. Also audit devices, right? Having a strong asset management policy is very, very important. This will reduce the number of rogue devices that you have. Also having a patch management policy. So as I mentioned before, 96% of incidents that happened with ransomware, it had some sort of vulnerability or exploitation. I think if you have a patch management policy in place, you can reduce that. And I’m not saying to wait for a vulnerability or a zero-day to then implement it. I think having some sort of patch management policy on a weekly or quarterly basis is really important. And someone who’s dedicated to that in your environment. And then also, I think one of the most important things is having a robust security program to prevent these complex threats. Essentially what that means is having that full coverage across your environment. So across endpoints, servers, cloud, network appliances, email appliances, all your Microsoft 365 environments. So the top three things is auditing accounts and devices, patch management, and having visibility and a security program in place to prevent this.
Robert Dutt: The report covers a lot of territory. I think we’ve walked through a lot of the areas that I was kind of most taken by. Any other major takeaways especially for this audience that you’d like to surface in terms of what you found and what it means for the solution provider or MSP?
Merium Khalid: Yeah, sure. So I think one of the things I want to talk about is the report is derived from real life data. So we actually, XDR in 2025 logged more than 2 trillion IT events. And this report is derived from real life data from our customers. So 600,000 security alerts issued to our customers. And then from the 600,000, we had 53,000 high severity alerts that led to an automated threat response. So what that means is we had 53,000 high alerts that led to either blocking a firewall, disabling an account, isolating a network. So we blocked 53,000 high severity incidents that could have led to a very high scale attack in their environment. I think that’s a really important thing to emphasize. And we also protected 230,000 endpoints in 2025. So I think just one of the main things here is the data, the report is derived from real life data and real life findings and from real life engineers and analysts that are right in the forefront of these attacks.
Robert Dutt: It always blows me away when we talk about security metrics and you have these sample sizes of trillions of alerts, of occurrences. It certainly adds to my awareness of that sense of potential for alert fatigue and just the overwhelm of there is so much going on. One last question for me. If MSPs remember three things from this report, from this conversation, what should they be?
Merium Khalid: So three main takeaways is understanding the severity of ransomware. How devastating it can be in your environment. It could literally take your business out if it is a severe enough ransomware. Second, the importance of patch management, making sure all your assets are patched, making sure if you do have public-facing assets in your environment, prioritize that, make that your number one priority. And third, have a security monitoring solution in place. I think that really makes or breaks having the right practices.
Robert Dutt: All right. I appreciate that. Thanks again for taking the time to talk through this and go through some of these results as it relates to the channel community. Greatly appreciate it.
Merium Khalid: Thanks, Rob. Thanks for having me.
Robert Dutt: There you have it, my chat with Merium Khalid from Barracuda. I’d like to thank Merium for sharing the findings of the report and her insights from life in the SOC. If there’s a thread running through this conversation, it’s that the threats aren’t getting more exotic, they’re getting faster. Three hours from breach to encryption, 96% of lateral movement ending in ransomware, and every single incident the team responded to involved at least one device that nobody was watching. The basics still matter. And this report makes a pretty compelling case that audit, patch, and monitor is still where it all starts. Tomorrow on In The Channel, I’m talking to Jeff Collins, CEO of WanAware, about a related problem. The blind spots that form in modern networks as AI workloads and hybrid architectures quietly reshape how traffic moves. If you’ve ever felt that you can’t quite see everything that’s happening inside a customer’s environment, that’s probably a conversation for you. Thanks for listening. I’m Robert Dutt for ChannelBuzz.ca, and I’ll see you in the channel.
