• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • Daily Security Bytes
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

FBIs Botched Plan to Catch REvil Cost Victims Millions

October 4, 2021 By Trevor Collins

Earlier this year Kaseya, who provides IT management software to service providers that support tens of thousands of organizations from schools to hospitals, was involved in a ransomware attack fueled by a compromise of their VSA Remote Monitoring and Management (RMM) software. While the ransomware only impacted a small percentage of their customer base, thousands of companies … [Read more...]

Half of Respondents Admitted to Sharing Their Passwords

September 28, 2021 By Trevor Collins

  We often write about passwords and password policies from the IT/security administrator side, usually after a password becomes compromised. We recently found a survey that looked at compromised passwords from the user’s side to better understand how users feel about them. The survey shows a few key points that shed light on the social side of passwords. We suspect the … [Read more...]

Mobile Carriers Leak 123 million Customer Records in One Week

August 20, 2021 By Trevor Collins

Over the last week we saw 70 million AT&T customers and 53 million T-Mobile customers have their personal data leaked to hackers. While we didn’t find any connections between these two breaches the timing of the incidents  is strange. AT&T has so far denied the breach involving their customers. While we don't have confirmation from the hackers who breached AT&T, … [Read more...]

Supply Chain Attacks Through an IDE

August 16, 2021 By Trevor Collins

David Dworken, a Google security researcher, presented a recent Defcon talk about how he found over 30 vulnerabilities in various Integrated Development Environments (IDEs) over the course of a few months of research.  Many believe that source code on its own is benign as long as you don’t compile and run it, but as Dworken proved, simply loading code into an IDE can cause … [Read more...]

Defcon Talk Timeless-Timing-Attacks

August 6, 2021 By Trevor Collins

Cyber security breach concept

  A recent Defcon talk by Tom Van Goethem and Mathy Vanhoef, "Timeless Timing Attacks" made significant progress on ways to create timing attacks over a network. Timing attacks work by extracting data form devices based on how long it takes to respond. To successfully run a timing attack, the attacker usually must be directly connected to the computer since the smallest … [Read more...]

« Previous Page
Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Most Exploited Vulnerabilities of 2021
  • The REturn of REvil?
  • 195 CISA Guidance for MSPs
  • Psychic Signatures

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • CISA Guidance for MSPs
  • The REturn of REvil?
  • Most Exploited Vulnerabilities of 2021
  • Psychic Signatures
  • Hidden Hafnium
View All

Search

Archives

Copyright © 2022 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use