Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

WatchGuard's 2022 Predictions

In our 2021 Security Predictions, the WatchGuard’s Threat Lab team anticipated that authentication would be the cornerstone of strong security. “With billions of usernames and passwords ripe for the picking on the dark web and the prevalence of automated authentication attacks, we believe that any service without MFA enabled will be compromised in 2021,” said WatchGuard CSO Corey Nachreiner.

Intune Script Secrets: How to Deploy Any Script with MS Intune

When it comes to deploying scripts for Intune admins, there is only one script method available: Intune PowerShell Scripts. PowerShell can be a powerful format, but you likely have existing scripts you want to leverage with your domain-joined and non-domain-joined machines. Intune script capabilities don’t enable you to deploy VBscripts, batch scripts, or JavaScript scripts. The screenshot below shows the full complement of options available for script deployment using MEM (Intune).

Why MSPs Save the World

Organizations of all sizes are struggling to keep up with the increasingly complex and evolving cybersecurity landscape. Threat actors aren’t just hunting large corporations, they’re aggressively targeting small and midsize businesses, too. As networks become more porous and cyber threats rise, organizations that lack in-house security expertise will increasingly become targets of attack and their losses will grow.

WatchGuard's SVP of Marketing, Michelle Welch, named 2021 Security Channel Chief of the Year by Channel Partner Insight

For the third year in a row, WatchGuard has been honored at Channel Partner Insight’s 2021 Channel Innovation Awards. This year, Senior Vice President of Marketing Michelle Welch was named the “Security Channel Chief of Year.” This annual awards program celebrates the partners and vendors that have brought true value and innovation to the managed services market and made a real difference to their customers over the last 12 months.

Fileless attacks: a cybersecurity insight to be taken into account

Hackers are highly trained cybercriminals with access to resources capable of compromising a system in an organization without being detected. And malwareless attacks – where cybercriminals access critical business networks without malware – are on the rise.

How to prevent known exploited vulnerabilities at the endpoint

The US Cybersecurity and Infrastructure Agency (CISA) has issued a directive to federal agencies and other public bodies requiring them to take steps to reduce their risk of exploited vulnerabilities. CISA highlights the startling finding that hackers are exploiting up to 290 different vulnerabilities in these agencies.

The Oculus (Meta) Quest Scam

Oculus (also now known as Meta) Quest is a virtual reality headset and game craze created by Facebook, and it is the ultimate tech must-have for the holidays in 2021. My 11-year-old son is obsessed with it and during the past few months it has been impossible to get due to a recall and the wait for the new Quest 2 to be released.

How businesses can protect themselves from DDoS attacks

In Distributed Denial of Service (DDoS) a system or network is flooded with online traffic from multiple sources in an attempt to make it unavailable. Cybercriminals take advantage of protocol or DNS server vulnerabilities that they exploit to launch attacks. Moreover, in larger scale attacks, they may use malware that infects thousands of hosts that target the victim to block it, all of them with different IP addresses, which is known as a botnet.

Cybersecurity Insights - Malware Evasion Techniques

The majority of malware that the WatchGuard Threat Lab analyzes each quarter is called “zero day malware,” meaning it successfully evaded signature-based anti-malware services. Modern tools and techniques continue to make evasive threats easier to carry out and more effective for adversaries of all skill levels. In this Cybersecurity Insights, learn how threat actors mask their attack payloads from detection and what you can do to defend your organization and customers from these evasive threats.