Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Episode 220 - Hacking Hyundai

On this week's episode, we cover the latest in car hacking, this time involving a vulnerability that could have given remote attackers full control over certain Hyundai models' doors, lights and engine. After that, we discuss the latest breach impacting a major password management app and how it's different from previous ones we've seen. We end with a discussion on the latest 'custom security solution' vendor selling spyware tools for profit.

MFA is the authentication method of choice for 83% of companies

Passwords are the most widespread form of authentication on different platforms and systems. Still, companies and users often do not prioritize creating strong passwords and continue to opt for simple and very weak passwords in the eyes of cybercrime professionals.

How MSPs can boost the adoption of unified security

Adopting robust processes to identify, classify, remediate, and mitigate vulnerabilities before attackers can exploit them is a new imperative in corporate environments. An efficient, proactive cybersecurity strategy must be multi-layered and able to consider challenges from all angles. Although increasing the number of solutions deployed to protect the attack surface may appear to be the answer, the opposite is true.

Wi-Fi in WatchGuard Cloud - Unboxing the AP332CR

Watch as Sr Sales Engineer, Martin Lethbridge, unboxes WatchGuard’s AP332CR and offers tips for connecting it to a network. IP67-rated and designed for mid-density, rugged/outdoor deployments, the AP332CR includes a dual-band radio with four external, omnidirectional antennas offering up to 1.2 Gbps on the 5 GHz band. Utilizing WatchGuard Cloud for deployment and configuration, the AP332CR offers a seamless experience with Wi-Fi 6 performance and WPA3 encryption.

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.

The Simply Cyber Report: November 29, 2022

Most commonly used passwords in 2022. A new red teaming tool called Nighthawk. Avast has published a report on the Venomsoft malware chrome extension. WhatsApp data leak: 500 million user records for sale. Recommendations that statistically reduces the number of cyber incidents experienced by a business by a whopping 85%.

Adventures in Open Source: A conversation about the journey and lessons learned

Open source as a philosophy was born alongside the Internet at a time when the world was much more optimistic. The naysayers said it couldn’t be done, that it wasn’t secure, and that it was just a matter of time before all these projects failed. Fast forward 30-40 years and the open source ecosystem is thriving. Linux runs on the top 500 super computers in the world, almost 95% of the world’s servers, and 85% of all smart phones.

The 443 Episode 219 - CISA Incident Response Learnings

On today's episode we cover a pair of alerts from the Cybersecurity Infrastructure and Security Agency (CISA), one detailing the tools, tactics and procedures from a prolific ransomware organization and another walking through a recent incident response engagement CISA completed with a federal agency. Before that though, we learn about what happens when you use a software component that hasn't received updates in 17 years.

Why endpoint security and MFA should always go together

The current cyberattack landscape has forced companies to look for new forms of protection, which is why they are increasingly resorting to the use of cyber insurance. The figures are alarming: 148,104 malware attacks are launched every day, which translates into 6,172 attacks per hour. The consequences of a breach can mean dedicating a large part of a company’s resources to restoring computer systems and dealing with any ensuing penalties and lawsuits.

Modern SOCs and MDR Services Series: 6 Benefits and Why They Matter

The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a SOC: detecting, analyzing, and responding to security incidents. These factors generate exponential growth in data volume and security alerts, which teams need more resources to address.