Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Advanced Endpoint Protection

Endpoints play a vital role in any organization’s operations. However, endpoints are susceptible to a variety of cyber attacks, particularly malware and ransomware – threats that remain highly popular among threat actors. Additionally, many social engineering attacks seek to gain access to individual users’ endpoints.

Exploring Endpoint Security: From Basics to AI-Era Threats, With Raakesh Thayyil

From antivirus to AI-powered threats, this session with Raakesh Thayyil (Group Head of Security & Privacy at PropertyGuru) breaks down the evolving world of endpoint security—what it means today, how remote work changed the game, and what lean security teams can actually do about it. What you’ll learn: Timestamps & Q&A included in the video chapters! Brought to you by The 403 Circle – an invite-only community for top CTOs & CISOs.

The Warning Signs You Can't Ignore: From Your Body to Your Business

We’ve all been there, pushing through a cold, a nagging pain, or a persistent feeling of being "off." We tell ourselves it’s nothing, that we’re too busy to slow down. I did the same thing, ignoring my body’s subtle whispers until they turned into a deafening roar. One moment, I was pushing through a typical day, and the next, I was in a hospital bed, a stark reminder that ignoring warning signs can have serious consequences.

How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Endpoint visibility is fundamental to many of the processes that underpin effective endpoint security: data collection, monitoring, alerting (including alert analysis), and comprehensive threat detection and response. Trouble is, the number, types, locations, and use cases of endpoints are constantly in flux, due to user comings and goings, role changes, broad use of virtual instances and cloud-based workloads, Internet of Things (IoT) proliferation, hybrid work, and numerous other factors.

Can threat actors make ChatGPT malware? #ai #cybersecurity #gpt5

GPT-5 was jailbroken in under 24 hours using simple "storytelling" techniques that bypass safety guardrails. The key insight from our podcast? Individual AI requests appear legitimate but become dangerous when combined. Bad actors can request network code in one session, convincing emails in another, and credential collection forms in a third. Each task seems normal individually, but together they form a complete phishing toolkit.

Inside the SonicWall SSLVPN Attacks

Inside the SonicWall SSLVPN Attacks In this week’s episode of The 443, Marc Laliberte and Corey Nachreiner break down: The recent SonicWall SSLVPN exploits What we know so far and how attackers are getting in The risks for organizations relying on vulnerable VPN gateways Plus: a WinRAR zero-day and a new ChatGPT vulnerability you should know about.

Make Your Security Stack Cloud-Flexible with LimaCharlie - Now on Google Cloud Marketplace

Built with security engineers in mind, LimaCharlie's API-first platform delivers on the promise of cloud-like flexibility for your security operations. Learn in the video how to obtain unified, granular visibility across your entire security landscape (multi-cloud, on-prem, endpoints) with day-one value.

Is Zero Trust a Total Bust? - The 443 Podcast - Episode 339

This week on the podcast, we discuss key findings from a DefCon presentation from researchers at AmberWolf titled ZeroTrust, Total Bust and what it means for Zero Trust Network Access. After that, we review a new vulnerability in the FortiWeb WAF before ending with a quick update from Google Project Zero on a new vulnerability disclosure policy. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.