• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Search Results for: automation

How Can Automation Improve Security?

April 21, 2017 By Teri Radichel

automation

A prior Secplicity blog post explored the potential of cloud security. Automation is one of the most important reasons to move applications to the cloud. By design, third-party cloud platforms can automate manual tasks to deploy, monitor and maintain systems. The AWS Architecting for the Cloud whitepaper explains best practices for cloud applications driven by automation. How … [Read more...]

Azure Linux VMs Vulnerable Due to Pre-Installed Agents

September 16, 2021 By Josh Stuifbergen

Update 1:  OMI agent is not installed on Azure FireboxV/Cloud instances (September 17th, 2021): We reviewed our FireboxV/Cloud instance for Azure and confirmed that the OMI agent cannot be installed on the image. We recommend reviewing the additional guidance Microsoft published on September 16th, 2021 for securing the OMI affected resources/tools. Original Post … [Read more...]

Supply Chain Attacks Through an IDE

August 16, 2021 By Trevor Collins

David Dworken, a Google security researcher, presented a recent Defcon talk about how he found over 30 vulnerabilities in various Integrated Development Environments (IDEs) over the course of a few months of research.  Many believe that source code on its own is benign as long as you don’t compile and run it, but as Dworken proved, simply loading code into an IDE can cause … [Read more...]

Securing Industry 4.0: Four Danger Zones and How to Protect Them

December 3, 2019 By The Editor

Implementing reliable security across increasingly complex company networks has become a daunting task for IT teams in the manufacturing sector. Malicious hackers are constantly coming up with newer and nastier ways to infiltrate even the smartest industrial technologies. According to recent research from IBM, destructive cyberattacks capable of rendering victim systems … [Read more...]

Security Researcher Track: 103

April 30, 2019 By Emil Hozan

As a security researcher, there are many things to keep in mind when conducting “daily routines,” if such a thing even exists. The computer science industry and related technologies are vast and nearly bottomless, there is just so much to learn that being able to cover everything wouldn’t really be realistic. Don’t get me wrong, strive to learn all that you can, but working on … [Read more...]

« Previous Page
Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • The RCE Vulnerability That Wasn’t
  • When Trying to Catch ‘Em All, Leave This RAT Alone

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: ACLU Unveils Mass Surveillance Program, (More) Malvertising, and Breaches
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
  • The RCE Vulnerability That Wasn’t
  • When Trying to Catch ‘Em All, Leave This RAT Alone
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use