Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

Navigating the Landscape of Security Frameworks and Regulations: A Guide to Vulnerability Management and Patching

In today's rapidly evolving cyber threat landscape, organizations across all industries face an imperative need to safeguard their digital assets. Adherence to standard security frameworks, regulations, and insurance requirements is not just a strategic step towards a robust cybersecurity posture but a matter of compliance. These standards, regulations, and insurance requirements mandate ongoing vulnerability management and patching to mitigate risks and protect sensitive data.

The 443 Podcast - Episode 278 - A Door in Apple's Walled Garden

This week on the podcast, we cover Apple's recent announcement describing how they will comply with the European Union's new Digital Markets Act and what that means for the iPhone walled garden. Before that, we cover a databreach at Mercedez-Benze thanks to an alternative authentication method. Additionally, we cover the roundup of vulnerabilities in Ivanti's remote Policy Secure and Connect Secure products and how organizations should respond.

The 443 Podcast - Episode 277 - A Blizzard of Threats

This week on the podcast, we cover two "Blizzard" threat actors targeting governments and private organizations. We also give an update to the SEC's compromised Twitter/X Account, and then end with a discussion of an EU program designed to improve their citizen's privacy while browsing the internet. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Data Privacy Dilemma: How to Address Growing Concerns in an Extremely Online World

Users are becoming increasingly aware of where and how their information is shared, and their concerns regarding the need to keep that data private are growing in turn. Digitalization, rising daily averages for time spent on the Internet and connected devices, along with the ongoing proliferation of cyberattacks, have made individuals more cautious than ever when it comes to providing information online – and rightfully so.

How to Strengthen Cybersecurity in the Healthcare Industry

Technology is a crucial part of today’s healthcare and pharmaceutical industries. Advances in medical devices, data use, and interconnected systems have significantly improved patient care, reduced costs, and increased efficiency. However, as the sector’s reliance on technology grows, so does the risk of cyberattacks.

The 443 Podcast - Episode 276 - Androxgh0st Analysis

This week on the podcast, we review a CISA and FBI joint advisory on the Androxgh0st malware. Before that we cover recent Volt Typhoon activity targeting SMB routers exposed on the internet. We end the episode with a fun research blog post about a series of flaws in an Indian insurance provider. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

5 Cybersecurity Resolutions for Small Businesses in the New Year

Small businesses are not immune to cyberattacks. Many cybercriminals target smaller-size organizations because they often operate on a lower cybersecurity budget and have less infrastructure to protect the company’s data, making them easier to attack. This targeting by cybercriminals is widespread, as demonstrated by an ITRC study which reveals that 73% of small businesses state they have encountered cybersecurity problems over last year.

The 443 Podcast - Episode 275 - NIST Tackles Adversarial AI

This week on the podcast, we review NIST's new publication that defines a taxonomy for how we talk about Adversarial Machine Learning. Before that, we cover a recent discovery of threat actors retaining access to Google accounts even through a password reset. We round out the episode with an account compromise that lead to a surge in Bitcoin price before finishing with a discussion of Living-off-Trusted Sites (LoTS) attacks that leverage GitHub.