Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2023

7 ways to protect remote employees from a cyberattack

Working from home (WFH) has brought with it advantages such as flexibility and access to global talent, but it has also introduced new security threats to organizations. The shift to a remote or hybrid workforce has forced companies to adopt more software-as-a-service (SaaS) applications, which has caused almost 40% of companies to lose control of their IT and security environments, according to data from a Cloudflare study.

Ducktail malware: what is it and why are businesses so concerned about it?

The number of new types of attacks that compromise organizations’ cybersecurity is on the rise. Cybercriminals are more capable than ever of adapting and upgrading their attack formats to circumvent their victims' protection protocols. Data shows that the volume of new attacks is increasing every year. According to Astra, this year we have reached a record number of 560,000 new types of malware detected daily. This brings the number of malware currently in existence to over one billion.

Disk encryption: the key to boosting your MSP service

Storing business data on personal devices and laptops has increased in recent years due to the shift towards hybrid or remote working models. This substantially raises the risk of sensitive information being exfiltrated if employees suffer theft, loss, or accidentally forget their devices.

The 443 Podcast - Episode 273 - Hacking the Crypto Supply Chain

This week on the podcast, we cover a supply chain attack against one of the largest hardware cryptocurrency wallet manufacturers. After that, we discuss the latest Apache Struts vulnerability under active exploit by threat actors. We end the episode with our thoughts on a research blog post about a set of threat actors using an old school attack against modern targets. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

MSP: 4 capabilities you need to include in your secure Wi-Fi solution

In today’s interconnected world, the growing use of wireless technologies creates greater vulnerability for security breaches. Given the rising number of users, devices, and applications on corporate Wi-Fi networks, organizations need to implement a security solution that can ensure exceptional performance and optimal protection to shield their networks from threats.

The risk behind QR codes, how to protect your business against quishing attacks

Cybercriminals are increasingly using QR codes in their phishing campaigns to trick users and obtain their email account information, credentials, or sensitive data. This tactic to obtain credentials known as quishing, or QR code phishing, was first observed at scale in May of this year, when a group of cybercriminals spoofed Microsoft security alerts asking employees across multiple industries to scan a QR code to update their account security settings.

How AI will Impact the Cybersecurity Industry in 2024

Artificial Intelligence is revolutionizing everything and cybersecurity is no exception. A growing number of industry experts and professionals are beginning to reflect on the benefits and risks of this innovative technology within the cybersecurity framework. AI can be used to enhance protection for businesses against threats but, on the flip side, it can also be applied to refine cybercriminal attacks.

Top 10 Misconfigurations according to CISA

Misconfigurations leave the door open to cybercriminals, which can lead to a range of serious problems, unauthorized access, loss of sensitive information, and disruption of services. In fact, many major data breaches are caused by misconfigurations. Alert to these dangers, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) recently released a joint advisory to warn about the most common cybersecurity misconfigurations in large organizations.

The 443 Podcast - Episode 272 - Bluetooth Busted

This week on the podcast, we cover a new unauthenticated keystroke injection vulnerability in the Bluetooth implementation on nearly every type of device. After that we discuss Logofail, a suite of vulnerabilities in most UEFI boot implementations that could let threat actors easily hide their tracks. We end by covering a recent CISA advisory on Adobe ColdFusion exploits in the wild. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

50% of CISOs will adopt practices focused on human behavior

Today, the human factor still plays a role in most cybersecurity incidents. Human error is involved in 74% of data breaches. It’s essential to shift towards designing human-centric controls that promote and facilitate the use of responsible cybersecurity practices among employees.

The 443 Podcast - Episode 271 - Our 2024 Security Predictions

This week on the podcast we discuss our cybersecurity predictions for 2024. We'll cover each of the 6 predictions for the coming year including the trends behind them and how to protect your organization if they come true! The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.