• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Vaporworms – The Top Threat of 2019?  

February 6, 2019 By The Editor

Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. Just a few short months ago, the WatchGuard Threat Lab predicted that 2019 would be the year we’d see a new breed of fileless malware with … [Read more...]

Why Government Vulnerability Disclosure Processes Need Private Sector Involvement

January 17, 2019 By The Editor

Most people are either staunchly for or against the practice of governments finding and concealing zero-day exploits for use in cyber warfare or information gathering campaigns. What’s often overlooked, though, are perspectives that this issue can be a lot more gray than it is black and white. Did you know that the US government actually has a process in place to assess both … [Read more...]

The Top Cyber Threats Businesses Face Today

December 12, 2018 By The Editor

As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that can afford not to ask the tough questions. When was the last time you … [Read more...]

Hackers Hit Crypto Jackpot with Easily Exploitable Oracle App Vulnerability

January 9, 2018 By The Editor

After Chinese security researcher, Lian Zhang, published a proof-of-concept exploit of an Oracle Web application server vulnerability last month, hackers were quick to take advantage of the information to make a quick buck. According to Ars Technica, the ongoing campaign targets Oracle’s PeopleSoft and WebLogic servers, leveraging the newly revealed vulnerability to mine … [Read more...]

Hackers Take Tips From WannaCry and Petya Ransomware Attacks

July 28, 2017 By The Editor

hacker code

Hackers are adding lessons they’ve learned from the worldwide spread of the WannaCry ransomware and Petya cyberattack to their playbook. According to an article in ZDNet, the hackers behind the Trickbot financial malware are testing a new version of Trickbot that uses a rough imitation of the EternalBlue security vulnerability to spread itself through an infected network like … [Read more...]

Next Page »

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use