Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

Webinar: 2023 Security Predictions - 15 Dec 2022

Every year, the WatchGuard Threat Lab team likes to dust off the crystal ball and predict the way cyber threats and information security will evolve going forward. Though we base our forecasts on quantifiable trends we’ve seen in the past, we also take the opportunity to extrapolate the more futuristic and dystopian cyber outcomes that might occur if attackers were left unchecked. In the end, our goal is to share how defenders must adjust to ensure we avoid the worst outcomes.

WatchGuard Cybersecurity Predictions Challenge 2023

In 2023, WatchGuard predicts that hackers will try to bypass your cybersecurity defenses using new techniques focused on business processes, identity, and artificial intelligence. This year, Corey and Marc square-off in a Predictions Challenge, offering different takes on potential hacks and attacks in these categories. Whose predictions will come true…only time will tell!

The 443 Episode 221 - Apple's New Privacy Expansion

This week on the podcast, we cover Apple's latest announcement of expanded privacy and security features for their users. Before that, we cover a major breach in the Android ecosystem followed by a new Internet Explorer (yes, that still exists) 0-day vulnerability. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

What were the biggest cyberattacks in 2022?

Cyberattacks consistently hit the headlines throughout the year, and they aren’t expected to slow down any time soon. While the intensity and impact change from one attack to the other, there are always a few that rank the highest in terms of size. We looked at the five biggest cyberattacks of 2022 and how they influenced users around the globe.

The 443 Episode 220 - Hacking Hyundai

On this week's episode, we cover the latest in car hacking, this time involving a vulnerability that could have given remote attackers full control over certain Hyundai models' doors, lights and engine. After that, we discuss the latest breach impacting a major password management app and how it's different from previous ones we've seen. We end with a discussion on the latest 'custom security solution' vendor selling spyware tools for profit.

MFA is the authentication method of choice for 83% of companies

Passwords are the most widespread form of authentication on different platforms and systems. Still, companies and users often do not prioritize creating strong passwords and continue to opt for simple and very weak passwords in the eyes of cybercrime professionals.

How MSPs can boost the adoption of unified security

Adopting robust processes to identify, classify, remediate, and mitigate vulnerabilities before attackers can exploit them is a new imperative in corporate environments. An efficient, proactive cybersecurity strategy must be multi-layered and able to consider challenges from all angles. Although increasing the number of solutions deployed to protect the attack surface may appear to be the answer, the opposite is true.

Wi-Fi in WatchGuard Cloud - Unboxing the AP332CR

Watch as Sr Sales Engineer, Martin Lethbridge, unboxes WatchGuard’s AP332CR and offers tips for connecting it to a network. IP67-rated and designed for mid-density, rugged/outdoor deployments, the AP332CR includes a dual-band radio with four external, omnidirectional antennas offering up to 1.2 Gbps on the 5 GHz band. Utilizing WatchGuard Cloud for deployment and configuration, the AP332CR offers a seamless experience with Wi-Fi 6 performance and WPA3 encryption.

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.