Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard's Q1 2025 Internet Security Report. - The 443 Podcast - Episode 335

This week on the podcast, Corey Nachreiner and guest host Ryan Estes from WatchGuard’s malware analysis team explore WatchGuard’s recently released Q1 Internet Security Report (ISR). As always with the ISR, we highlight the top malware, network attacks, and malicious domains that our products see, but with our guest host, the author of the Endpoint section, we dive much deeper into all the threats arriving at our customers’ endpoints. Listen in for the latest threat landscape trends and some practical tips to stay safe from the most recent threats.

Can Git Restore a Deleted File?

Git, as a version control system, is very popular nowadays. Developers often make mistakes or encounter errors, such as accidentally deleting files. It is convenient not just because you can do many different operations with it, including such git commands as git revert, git push, git reset, git rebase, or many more. But it can also permit you to restore deleted files. Developers can recover from these mistakes using Git’s tools. Fortunately, for us, Git really has the right tools to do so.

Trustwave Launches Managed Phishing for Microsoft Service

Phishing remains the number one method attackers use to gain initial access to organizations. That makes your workforce the front line of defense and your ability to identify, neutralize, and respond to phishing attempts is more critical than ever. Trustwave’s Managed Phishing for Microsoft is a service designed specifically for organizations leveraging Microsoft Office 365 and Defender for Office (E5 or equivalent).

Ransomware Strikes : The Final Conclusion (Part 4)

Moving into the Final Chapter of Our Ransomware Series! You've made it through the critical first hour—great job! Now, the real work begins. In this video, we go into the after effects and solutions to what happens after the initial containment, including the importance of a solid Incident Response Plan, whether to pay the ransom, engaging experts, and the crucial steps to recover and harden your defenses.

Shadow AI Is Everywhere. Cato Puts You Back in Control

Generative AI boosts productivity—but also introduces serious risks: data leakage, compliance violations, and flawed outputs. Most enterprises lack visibility into how GenAI tools are being used across their environment. Cato changes that. In this video, we introduce Cato’s GenAI Security Controls—a native part of the Cato SASE Cloud Platform. No extra consoles. No new licenses. Just immediate visibility and control.

Stop Remote Ransomware Attacks with Falcon Endpoint Security

Ransomware is a rapidly evolving threat, with attackers increasingly turning to remote techniques that target network shares. To help defend against these tactics, CrowdStrike Falcon Prevent endpoint security includes a capability called File System Containment, which is precision-focused to block malicious file system actions over Windows Server Message Block (SMB) shares, halting encryption as soon as possible.

One Year Later: Reflecting on Building Resilience by Design

The one-year anniversary of July 19 marks a moment that deeply impacted our customers and partners and became one of the most defining chapters in CrowdStrike’s history. The incident impacted systems globally, and we responded with urgency and focus. That day reinforced the responsibility we’ve always carried as guardians of our customers’ digital infrastructure and trust.

Prevent Social Engineering Attacks: A Practical Guide Using Contextual Threat Intelligence

According to Zoho Workplace, organizations struggle to protect themselves as spam makes up 45% of all emails. These sophisticated threats deliberately exploit human psychology. Attackers convince people to bypass security measures, which leads to unauthorized access to the system. Standard defense mechanisms alone cannot curb these evolving threats. This blog explores how organizations can prevent social engineering using contextual threat intelligence and real-time behavioral analysis.