Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Report: Malware Explodes Across Network and Endpoints

In WatchGuard’s just-released Q1 2025 Internet Security Report, one thing is clear: attackers are getting faster, stealthier, and more sophisticated, powered by an underground boom in AI tools. The numbers speak for themselves: These insights paint a clear picture: evasive, AI-driven threats are reshaping the cybersecurity battlefield. Organizations must adapt with layered, intelligent, and proactive defenses to stay ahead.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.

The future of the digital estate: Automomous Endpoint Management | Tanium & endpointX

In this TechMonitor vodcast, brought to you in partnership with Tanium and endpointX, we dive into the evolving world of autonomous endpoint management (AEM). Join Dan Jones (Senior Security Advisor, EMEA at Tanium) and Dan Stead (Director at endpointX) as they explore: Whether you're in the public or private sector, this conversation offers valuable insights into how to secure and streamline your enterprise with modern tools.

Enhancing Endpoint Visibility Through a Unified Security Approach

It’s easy to miss critical signs when endpoint tools work in isolation. When a laptop shows unusual behavior but its network or cloud interactions are invisible, early compromise can go undetected. By bringing together endpoint detection and response (EDR), network telemetry, and cloud context under a unified security approach, teams gain the full picture needed to spot threats quickly.

AI in Endpoint Security

It’s no revelation to say that the world of connectivity has fundamentally changed since the pandemic. What may be more eye-opening, however, is how this shift has created a cybersecurity landscape more complex than ever before. Why? As companies increasingly embrace cloud computing, remote work, and BYOD (Bring Your Device) policies, endpoint security has become a critical pillar in defending against cyber threats. However, there is a challenge.

Lessons From The M&S Breach - The 443 Podcast - Episode 333

This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.

The SOC of Tomorrow Delivered Today: MDR and AI for MSPs

Think building a SOC is out of reach? Think again. With MDR and AI working together, MSPs can now deliver 24/7 protection through what’s becoming an autonomous SOC – one that scales without increasing overhead or alert fatigue. This webinar will show how the modern SOC is already within reach, and how to start offering it. You’ll learn.