Quantcast
Channel: Firedot – Network honeypot sensor
Browsing all 90 articles
Browse latest View live

Fireware 12.0.2 is now available

Fireware 12.0.2 General Availability We are pleased to announce the General Availability (GA) of Fireware 12.0.2 and WSM 12.0.2 today. These releases, which are now available at the software download...

View Article


WTB: Phishers Target Panicking PayPal Users with Fake “Failed Transaction”...

The intelligence in this week’s iteration discuss the following threats: Backdoor, Data breach, Data theft, Malspam, Misconfigured bucket, Phishing, RAT, Spyware, Trackers, and Vulnerabilities. The...

View Article


Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps

By intelligently managing signatures, correlation rules, filters and searches, you can see where your security architecture falls down, and how your tools can better defend the network. Source: Cyber...

View Article

6 Personality Profiles of White-Hat Hackers

From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking – most just like the challenge. Source: Vulnerabilitys & Threats

View Article

What is Threat Intelligence?

Written by Steve Miller and Payton Bush Threat intelligence is a subset of intelligence focused on information security. Gartner (sorry, people) defines threat intelligence as “evidence-based...

View Article


Rutkowska: Trust Makes Us Vulnerable

Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk. Source: Vulnerabilitys & Threats

View Article

What Slugs in a Garden Can Teach Us About Security

Design principles observed in nature serve as a valuable model to improve organizations’ security approaches. Source: Vulnerabilitys & Threats

View Article

Wi-Fi Maintenance Update

Hello WatchGuard Wi-Fi Cloud Users, We are planning a brief maintenance on Friday December 8, 2017 between 7:00PM and 8:00PM Pacific Time to deploy improvements to the Wi-Fi Cloud. During the...

View Article


WTB: German Spy Agency Warns of Chinese LinkedIn Espionage

The intelligence in this week’s iteration discuss the following threats: APT, Banking trojan, Botnet, Data leak, Malspam, Malvertising, Pre-installed keylogger, Ransomware, Targeted attacks,...

View Article


Image may be NSFW.
Clik here to view.

Remote Care! The Great Healthcare Disruptor

In late October in Boston, Mass., the top minds in healthcare and technology came together at the Connected Health Conference to envision how connected healthcare will transform patient care and the...

View Article

Image may be NSFW.
Clik here to view.

A Very Malicious Christmas

In 2017, Americans are projected to spend $906 million on gifts, up from $785 in 2016. A significant chunk of that total will be spent online. As consumers turn to the internet, those looking to...

View Article

Advanced Deception: How It Works & Why Attackers Hate It

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Source: Vulnerabilitys & Threats

View Article

Fireware 12.1 Now Available

We are pleased to announce the new release of Fireware 12.1 and WSM 12.1! These significant new releases are now available for download from the software download center. The highlight of Fireware 12.1...

View Article


WTB: New GnatSpy Mobile Malware Family Discovered

This section listed below contains summaries on various threat intelligence stories that occurred during the past week. The intelligence in this week’s iteration discuss the following threats:...

View Article

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

CTI falls into three main categories — tactical, operational, and strategic — and answers questions related to the “who, what, and why” of a cyber attack. Source: Cyber Monitoring

View Article


Customer Support Access Changes

As a loyal WatchGuard customer, I’m sure that you’re aware that WatchGuard is growing!  To address your future needs, WatchGuard Customer Support is changing the way our technicians connect to your...

View Article

Security Worries? Let Policies Automate the Right Thing

By programming ‘good’ cybersecurity practices, organizations can override bad behavior, reduce risk, and improve the bottom line. Source: Cyber Monitoring

View Article


Image may be NSFW.
Clik here to view.

IoT-Driven Cold Chain Tracking Provides Quality Control on the Go

For some products, maintaining strict temperature controls during shipping is critical. Certain pharmaceuticals and vaccines require an unbroken chain of refrigerated environments to guarantee safety...

View Article

WatchGuard Dimension 2.1.1 Update 2 now available

We are pleased to announce the availability of WatchGuard Dimension 2.1.1 Update 2. This maintenance release is now available from the Software Downloads Center, together with release notes and update...

View Article

Image may be NSFW.
Clik here to view.

12 Days of Threats

On the first day of Christmas a hacker stole from me, Thousands in my favorite cryptocurrency… On the second day of Christmas a hacker stole from me, Two plain-text passwords and thousands in my...

View Article
Browsing all 90 articles
Browse latest View live