Fireware 12.0.2 is now available
Fireware 12.0.2 General Availability We are pleased to announce the General Availability (GA) of Fireware 12.0.2 and WSM 12.0.2 today. These releases, which are now available at the software download...
View ArticleWTB: Phishers Target Panicking PayPal Users with Fake “Failed Transaction”...
The intelligence in this week’s iteration discuss the following threats: Backdoor, Data breach, Data theft, Malspam, Misconfigured bucket, Phishing, RAT, Spyware, Trackers, and Vulnerabilities. The...
View ArticleImprove Signal-to-Noise Ratio with 'Content Curation:' 5 Steps
By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network. Source: Cyber...
View Article6 Personality Profiles of White-Hat Hackers
From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking – most just like the challenge. Source: Vulnerabilitys & Threats
View ArticleWhat is Threat Intelligence?
Written by Steve Miller and Payton Bush Threat intelligence is a subset of intelligence focused on information security. Gartner (sorry, people) defines threat intelligence as “evidence-based...
View ArticleRutkowska: Trust Makes Us Vulnerable
Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk. Source: Vulnerabilitys & Threats
View ArticleWhat Slugs in a Garden Can Teach Us About Security
Design principles observed in nature serve as a valuable model to improve organizations’ security approaches. Source: Vulnerabilitys & Threats
View ArticleWi-Fi Maintenance Update
Hello WatchGuard Wi-Fi Cloud Users, We are planning a brief maintenance on Friday December 8, 2017 between 7:00PM and 8:00PM Pacific Time to deploy improvements to the Wi-Fi Cloud. During the...
View ArticleWTB: German Spy Agency Warns of Chinese LinkedIn Espionage
The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Botnet, Data leak, Malspam, Malvertising, Pre-installed keylogger, Ransomware, Targeted attacks,...
View ArticleRemote Care! The Great Healthcare Disruptor
In late October in Boston, Mass., the top minds in healthcare and technology came together at the Connected Health Conference to envision how connected healthcare will transform patient care and the...
View ArticleA Very Malicious Christmas
In 2017, Americans are projected to spend $906 million on gifts, up from $785 in 2016. A significant chunk of that total will be spent online. As consumers turn to the internet, those looking to...
View ArticleAdvanced Deception: How It Works & Why Attackers Hate It
While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Source: Vulnerabilitys & Threats
View ArticleFireware 12.1 Now Available
We are pleased to announce the new release of Fireware 12.1 and WSM 12.1! These significant new releases are now available for download from the software download center. The highlight of Fireware 12.1...
View ArticleWTB: New GnatSpy Mobile Malware Family Discovered
This section listed below contains summaries on various threat intelligence stories that occurred during the past week. The intelligence in this week’s iteration discuss the following threats:...
View ArticleComprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence
CTI falls into three main categories — tactical, operational, and strategic — and answers questions related to the “who, what, and why” of a cyber attack. Source: Cyber Monitoring
View ArticleCustomer Support Access Changes
As a loyal WatchGuard customer, I’m sure that you’re aware that WatchGuard is growing! To address your future needs, WatchGuard Customer Support is changing the way our technicians connect to your...
View ArticleSecurity Worries? Let Policies Automate the Right Thing
By programming ‘good’ cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line. Source: Cyber Monitoring
View ArticleIoT-Driven Cold Chain Tracking Provides Quality Control on the Go
For some products, maintaining strict temperature controls during shipping is critical. Certain pharmaceuticals and vaccines require an unbroken chain of refrigerated environments to guarantee safety...
View ArticleWatchGuard Dimension 2.1.1 Update 2 now available
We are pleased to announce the availability of WatchGuard Dimension 2.1.1 Update 2. This maintenance release is now available from the Software Downloads Center, together with release notes and update...
View Article12 Days of Threats
On the first day of Christmas a hacker stole from me, Thousands in my favorite cryptocurrency… On the second day of Christmas a hacker stole from me, Two plain-text passwords and thousands in my...
View Article