Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Know About the Sonicwall SSLVPN Attacks - The 443 Podcast - Episode 338

This week on the podcast, we discuss some recent research into a new zero day vulnerability in the popular WinRAR utility under active exploit. After that, we give a round up on everything we know about the SonicWall SSLVPN attacks from the last few weeks before ending with a review of a new ChatGPT vulnerability. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

What Akira Ransomware Gang Taught This Company

What is ransomware? Ransomware is a form of malicious software that encrypts an organization’s files or systems, effectively locking users out until a ransom is paid, usually in cryptocurrency. But in 2025, ransomware is more than just malware. It’s a multi-billion-dollar criminal business. So far this year, 4,441 organizations have been publicly listed as ransomware victims.

Next-Gen Firebox Tabletop Series from WatchGuard Brings Flexible, Powerful, and Future-Ready Firewalls to MSPs

WatchGuard's new T Series Fireboxes provide intelligent firewall security, AI-powered threat detection, and eco-conscious hardware, giving managed service providers (MSPs) stronger threat protection with less complexity and waste.

Meet the New Firebox T Series: Smarter, Stronger, and Ready for Real-World Cyberthreats

With evolving cyber threats and rapidly advancing technologies, today’s SMBs have no choice but to modernize their networks to stay secure, efficient, and competitive. WatchGuard is ready to support them with the launch of the next-gen Firebox Tabletop Series: Future-ready firewalls built for how businesses operate now and where they’re headed next.

Summer, AI, and Identity-Based Threats: A Strategic Wake-Up Call for MSPs

As CSOs, we know cybercriminals don't clock out for summer. If anything, the seasonal drop in staffing and vigilance creates ideal conditions for identity-based attacks, especially for MSPs juggling multiple client environments. You need more than ever security that “just works” even under imperfect conditions with tools that remain reliable and effective—not fragile theory.

Wi-Fi Intrusion from neighboring networks, how to stop the Nearest Neighbor Attacks

Wireless networks have traditionally been a weak point in corporate cybersecurity. However, what was once a localized risk, limited to an office space, has now evolved into a more sophisticated threat, making detection more difficult.

The 5 Most Common Cybersecurity Pitfalls MSPs Must Avoid

Managing cybersecurity as a managed service provider isn’t getting any easier. You’re juggling a fast-evolving threat landscape, rising customer expectations, and fierce competition ‒ all while trying to grow your business and protect your clients. Even the most experienced MSPs can fall into common traps that drain profits, overcomplicate operations, and increase security risk. Here are five pitfalls that might be holding your business back ‒ and how to sidestep them.

Beyond the Operating System: Ransomware in the CPU

Being alert to ransomware is nothing new. Ransomware can wreak havoc and often cause permanent damage to endpoints, unless effective recovery processes are in place. Many ransomware operators attempt to delete shadow copies and other recovery methods, which makes redundancy in recovery essential. However, the situation becomes even more serious with the emergence of microcode ransomware.

Outing Chinese Semiconductor Cyber Spies - The 443 Podcast - Episode 336

This week on the podcast, Corey Nachreiner and guest host Ryan Estes, from WatchGuard’s malware analysis team, cover the cybersecurity news for last week. We chat about AI-based site cloaking tools on the underground, how Domain Tools found potentially unwanted executables hiding in DNS TXT records, and a Chinese state-sponsored set of targeted phishing campaigns going after the Taiwanese semiconductor industry and its supply chain. Join us to learn more and discuss how we can protect ourselves from similar threats.

NIST's new LEV metric: How does it help companies?

The National Institute of Standards and Technology (NIST) has unveiled a new metric that promises to revolutionize the way vulnerability management is prioritized. Likely Exploited Vulnerabilities (LEV) is a ranking designed to help organizations focus their efforts on the flaws that cybercriminals are actively using to perpetrate real-world attacks. Thousands of vulnerabilities are reported every year but only a small fraction is exploited in the wild.