Thanks to WatchGuard’s Panda Adaptive Defense 360 zero-trust service, WatchGuard Threat Lab was able to identify and stop a sophisticated fileless malware loader before execution on the victim’s computer. Upon further detailed analysis by our attestation team, we identified several recent browser vulnerabilities that the malware targeted as part of its exploit chain. Malware … [Read more...]
Can I Have Both Privacy and Security? MAC Address Privacy in Public
For those running the latest operating systems for your computers, phones, and tablets, you may have noticed the changes to how your device connects to wireless networks. Apple has made headlines for their iOS 14 update that enables randomized Mac addresses by default. While this implementation is somewhat unique in that it does more to protect user privacy, this is not the … [Read more...]
Identifying an Existing APT Intrusion
Last month while onboarding a new customer to Panda EDR with the Orion threat hunting console, WatchGuard Threat Lab discovered an existing advanced persistent threat (APT) on the organization’s network. WatchGuard Threat Lab investigated the incident and were able to identify much of the threat actor’s tools, techniques and procedures including several indicators of compromise … [Read more...]
Combating Disinformation with Nina Jankowicz
This week on The 443 – Security Simplified, we sit down for a chat on disinformation with Nina Jankowicz, author of How to Lose the Information War. From the US to Estonia, we’ll discuss how nation states are weaponizing social discussion against their adversaries to sow discord and advance their own influence and agenda, in some cases without even having to pick a side. … [Read more...]
Three Cybersecurity Tips from the Sci-Fi Hit Altered Carbon
The Netflix show (and even better book series) Altered Carbon (AC) takes place in a dark and dystopian future. Humanity has figured out how to “digitize” our brains and place them into other bodies, effectively allowing the richest in society to live forever. Although AC is fiction, it illustrates several real-life information security challenges extremely well. Let’s dive into … [Read more...]