Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2022

Important Detection and Remediation Actions for Cyclops Blink State-Sponsored Botnet

Working closely with the FBI, CISA, DOJ, and UK NCSC1, WatchGuard has investigated and developed a remediation for Cyclops Blink, a sophisticated state-sponsored botnet, that may have affected a limited number of WatchGuard firewall appliances. WatchGuard customers and partners can eliminate the potential threat posed by malicious activity from the botnet by immediately enacting WatchGuard’s 4-Step Cyclops Blink Diagnosis and Remediation Plan.

IABs and RaaS

There are tens of thousands of clandestine pages and forums on the dark web that are not indexed by search engines, so they remain hidden unless the user knows the address in advance. This includes discussion forums where techniques or tools are shared with which cyberattacks can then be launched, but these sites also serve as a black market for buying and selling illicitly obtained data.

The new wave of phishing with the Omicron variant

With the outbreak of the pandemic, companies and institutions around the world have fallen prey to cybercriminals who have lured their victims through COVID-19. During the first four months of 2020, INTERPOL detected 907,000 cases of spam emails, 737 malware incidents, and 48,000 malicious URLs, all received by just one company, using coronavirus as bait.

The factors that determine the cost of cyber insurance

In our predictions, we highlight how cybersecurity will become a key area for insurers in 2022. The seriousness and growth in damages caused by cyberthreats has raised the price of policies sharply in 2021, according to experts. Given this situation, companies must either be prepared to take out new insurance at higher rates or expect a rise in the cost of their current policy. But what elements determine the cost of cyber insurance for insurers? There are 5 key factors, both internal and external.

Why push notifications are the best way to protect passwords

Are passwords still the most common strategy for protecting accounts in organizations? This Pulse password security survey reveals that 38% of respondents use between 4 and 6 password-protected accounts on a daily basis and 49% admit that their IT teams resolve an average of 9 password-related issues every day. The majority acknowledge that this has been exacerbated by remote working during recent months due to the pandemic.

Unified Security for a Reconnecting World

During the last year we have been more connected than ever. We have adapted to a new way of life and found new ways to overcome the distance and physical isolation from our colleagues through digital connectedness. The world will continue to evolve and we will adapt with you in every step of the way protecting your business wherever you are.

WatchGuard Wins Big in CRN's 2022 Channel Chiefs List

For the fifth consecutive year, CRN has honored several WatchGuard leaders in its annual Channel Chiefs list. This exclusive awards program shines a spotlight on the top IT channel vendor executives who continually demonstrate a high level of expertise, influence and innovation in the channel.

MSPs' New Year's Resolutions 2022

The latest edition of the World Economic Forum's (WEF) Global Risks Report once again highlights cyber threats as one of the greatest risks worldwide: 19.5% of respondents identified cybersecurity failure as a "critical short-term threat" to the world. The report specifically points out that the growing dependence of organizations' physical systems on the digital realm could jeopardize the continuity of many businesses or services.

6 challenges when protecting a distributed workforce

When employees connect to professional networks remotely the cyber-threat level rises. Elements such as the expansion of the security perimeter of organizations when working remotely or the proliferation of threats from COVID-19-related topics have changed the way we understand cybersecurity. But there are other, more specific challenges that make it more difficult for MSPs to protect clients that have a remotely distributed workforce. These 6 challenges are.

Why should you include threat hunting services in your portfolio?

As mentioned in our previous blog post about threat hunting, there is significant interest in it. In fact, according to Pulse, 32% of IT leaders say that their organizations plan to reinforce their endpoint security posture by adding a threat hunting program to their overall security strategy. And it is not surprising since it is a potent tool to defend your customer. Here we have some of the key benefits that hunting brings to your value-added services.