Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

WatchGuard Endpoint Risk Assessment Demo - How to Activate It

Discover your corporate's hidden risks with WatchGuard Endpoint Risk Assessment. This essential tool dives deep into endpoint security, unveiling vulnerabilities from zero-day malware to end-of-life software. It's not just a practice. It's your shield against major security breaches, ensuring the continuity and protection of your business.

49% of Corporate Directors Still See Cybersecurity as a Challenge

Boards of directors are working to improve their ability to oversee cybersecurity risk management. This is in response to the growing frequency and severity of cyberattacks, as well as new regulations that require organizations to take a more proactive approach to cybersecurity.

7 ways to protect remote employees from a cyberattack

Working from home (WFH) has brought with it advantages such as flexibility and access to global talent, but it has also introduced new security threats to organizations. The shift to a remote or hybrid workforce has forced companies to adopt more software-as-a-service (SaaS) applications, which has caused almost 40% of companies to lose control of their IT and security environments, according to data from a Cloudflare study.

Ducktail malware: what is it and why are businesses so concerned about it?

The number of new types of attacks that compromise organizations’ cybersecurity is on the rise. Cybercriminals are more capable than ever of adapting and upgrading their attack formats to circumvent their victims' protection protocols. Data shows that the volume of new attacks is increasing every year. According to Astra, this year we have reached a record number of 560,000 new types of malware detected daily. This brings the number of malware currently in existence to over one billion.

Disk encryption: the key to boosting your MSP service

Storing business data on personal devices and laptops has increased in recent years due to the shift towards hybrid or remote working models. This substantially raises the risk of sensitive information being exfiltrated if employees suffer theft, loss, or accidentally forget their devices.

The 443 Podcast - Episode 273 - Hacking the Crypto Supply Chain

This week on the podcast, we cover a supply chain attack against one of the largest hardware cryptocurrency wallet manufacturers. After that, we discuss the latest Apache Struts vulnerability under active exploit by threat actors. We end the episode with our thoughts on a research blog post about a set of threat actors using an old school attack against modern targets. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

MSP: 4 capabilities you need to include in your secure Wi-Fi solution

In today’s interconnected world, the growing use of wireless technologies creates greater vulnerability for security breaches. Given the rising number of users, devices, and applications on corporate Wi-Fi networks, organizations need to implement a security solution that can ensure exceptional performance and optimal protection to shield their networks from threats.

The risk behind QR codes, how to protect your business against quishing attacks

Cybercriminals are increasingly using QR codes in their phishing campaigns to trick users and obtain their email account information, credentials, or sensitive data. This tactic to obtain credentials known as quishing, or QR code phishing, was first observed at scale in May of this year, when a group of cybercriminals spoofed Microsoft security alerts asking employees across multiple industries to scan a QR code to update their account security settings.

How AI will Impact the Cybersecurity Industry in 2024

Artificial Intelligence is revolutionizing everything and cybersecurity is no exception. A growing number of industry experts and professionals are beginning to reflect on the benefits and risks of this innovative technology within the cybersecurity framework. AI can be used to enhance protection for businesses against threats but, on the flip side, it can also be applied to refine cybercriminal attacks.

Top 10 Misconfigurations according to CISA

Misconfigurations leave the door open to cybercriminals, which can lead to a range of serious problems, unauthorized access, loss of sensitive information, and disruption of services. In fact, many major data breaches are caused by misconfigurations. Alert to these dangers, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) recently released a joint advisory to warn about the most common cybersecurity misconfigurations in large organizations.