Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Cybersecurity Insights - Fileless Attacks

In just the first half of 2021, script-based fileless malware attacks have already nearly reached their entire 2021 total, which in itself was up 888% from the year prior. These highly evasive threats use living-off-the-land (LotL) techniques to fly in under the radar and sneak past many legacy endpoint protections. In this Cybersecurity Insights, WatchGuard Security Operations Manager Marc Laliberte will discuss what fileless malware is, how it works, how attackers are using it, and what you need to do to keep your systems safe from this massively popular threat.

How MSPs should systematize demanding customer relations

CISA, the US Cybersecurity and Infrastructure agency, has recently released a report on Managed Service Providers (MSPs). The agency recognizes that MSPs play a critical role for businesses, providing IT services that would otherwise be too costly or too time-consuming and resource-intensive.

In Times of Ransom(every)ware, Unified Security is Essential

Following a series of headline-grabbing ransomware attacks that disrupted critical services in the US, FBI Director Christopher Wray likened the threat posed by ransomware to the September 11 terrorist attacks of 2001. According to Wray, recent attacks against one of the largest oil pipeline operators in the United States and a major meat processing operation may be just a harbinger of what is to come.

Could your kids spot this mobile phish?

I realized early on that if I didn’t teach my kids how to identify and avoid likely attacks on their laptops and phones, that no one would. Nevertheless, when I see an opportunity for a “teachable security moment” I grab it, and last week this mobile phishes appeared on my phone. I captured a screen shot to share with my children and we played a little “spot the phish” game, where they would point out all the things that made this text suspicious.

Malware Dropped Through Google Ads Targeting Banks

Banks continue to be a top target for cyber criminals. As we indicated in our blogpost on the risks to financial services networks, in 2020 alone there were more than 1,500 cyberattacks on banks, and in recent months, we’ve seen incidents such as the cyberattack on the New Zealand Federal Reserve and against the largest bank in Ecuador. Now, a new threat has emerged, and the main targets are Australian and German banks.

Ad blockers: key tools in the fight against malware

A document sent to the US Congress published by Motherboard, the technology section of Vice, confirms that CIA personnel, the NSA and other members of the US Intelligence Community widely use ad blockers in their Internet browsers. This measure was adopted to remove the distraction of adverts on web pages for employees, but it provides additional protection against malware.

Automating MITRE ATT&CK Testing w/ Atomic Red Team & LimaCharlie

This LimaCharlie integration of Red Canary's Atomic Red Team enables users to run tests mapped to the MITRE ATT&CK® framework against their deployments with just a few clicks of a button. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments. General Links Course Playlists Social Media.

Strong Relationships Matter More When MSPs Consolidate Vendors

A rising tide lifts all boats. This common phrase offers a perfect explanation of why strong supplier and partner relationships are essential to the success of your business. Partner programs come in all shapes and sizes, but not all provide the same value to you and your business. However, when you invest in developing key business collaborations, both your company and its suppliers can reap the rewards of your efforts.