Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Turbocharge Cybersecurity with Detection and Response

Ransomware is on the rise, cyber insurance is hard to get, and employees are still clicking on things that they shouldn’t. Even as criminals make use of automated tools to unlock threat vectors, new AI-based detection and response solutions enable advanced techniques to find and eliminate lurking threats and turbocharge cybersecurity. Join WatchGuard experts for an eye-opening session on how AI is transforming MSP businesses, so they increase security efficacy, build trust with clients, and grow with detection and response innovation.

The FortiManager RCE Vulnerability - The 443 Podcast - Episode 311

This week on the podcast, we review Fortinet's recently-disclosed remote code execution vulnerability in the FortiManager system that has been under active exploit since at least June. After that, we discuss the SEC's recent action against 4 companies found at fault for misleading security incident disclosure statements. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Taking Down The Whole Internet (Archive) - The 443 Podcast - Episode 310

This week on the podcast, we cover security incident that brought the Internet Archive and all of its services down, including the Way Back Machine. Before that, we discuss a Chinese nation-state backed threat actor that compromised three major American telecommunications providers and may have gained access to the US wiretapping system. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The CUPS Vulnerability - The 443 Podcast - Episode 308

This week on, Corey Nachreiner and Marc Laliberte cover the "9.9/10 severity vulnerability affecting most Linux systems" that a researcher disclosed last week and what it means for Linux systems administrators. They also discuss a research post into Kia's remote control systems and then end with a new act that was just introduced into the US Senate to secure the healthcare industry.

LLMHijacking - The 443 Podcast - Episode 309

This week we cover a research write up on a new technique to monetize stolen AWS credentials. Before that, we discuss a Linux malware variant that went unexposed until just recently and a story about a serial hacker that was caught because of opsec failures. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

The CUPS Vulnerability- The 443 Podcast - Episode 308

This week on the podcast, we cover the "9.9/10 severity vulnerability affecting most Linux systems" that a researcher disclosed last week and what it means for Linux systems administrators. We then discuss a research post into Kia's remote control systems that allowed one researcher to compromise any Kia in the last decade by just knowing their license plate number. We end with a new act that was just introduced into the US Senate with a goal to secure the healthcare industry.

The 443 Podcast - Episode 307 -How To Deanonymize the TOR Network

This week on the podcast, we discuss how German law enforcement managed to deanonymize and arrest users on the TOR network. After that, we discuss why the US government is trying to ban Chinese-manufactured car hardware. We then end with a cool research article on chaining open redirect and iframe issues into a 1-click vulnerability that grants attackers access to arbitrary Google Docs files. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Zero Trust Models Against Emerging Threats

Cybercriminals have become more sophisticated than ever and have access to many tools to carry out their attacks. It's important to understand that cybersecurity is not a one-and-done task, but rather an ongoing process that requires constant assessment and improvement. This is why the cybersecurity industry is evolving rapidly, embracing new protection methods that integrate AI-powered technologies and services to automatically detect threats and stay one step ahead of advanced attacks.