Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Firewalls and VPNs in the Line of Fire: How Exploits Are Evolving

Over the past year, cybercriminal activity has shifted toward exploiting vulnerabilities found in company perimeters and infrastructure systems. Attacks are also being carried out within shorter and shorter timeframes. According to data from Google Threat Intelligence Group (GTIG) in 2024, 44% of zero-day attacks affected enterprise-focused technologies, compared to 37% in 2023.

Social Engineering an LLM - The 443 Podcast - Episode 332

This week on the podcast, we cover a recent blog post from Google's Threat Intelligence Group on a financially motivated threat actor's latest techniques for stealing data. After that, we dive into the Model Context Protocol (MPC) that organizations have been rapidly adopting to add functionality to their AI deployments and all of the security risks that it introduces. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Earns 2025 Top Rated Awards From TrustRadius

We’re proud to announce that WatchGuard has earned eight 2025 Top Rated Awards from TrustRadius, a trusted platform where real users share honest feedback. These awards highlight the exceptional value our customers experience across security categories, directly reflecting their reviews and satisfaction.

DBIR 2024: AI Fuels more Cyber Threats though its Impact Remains Limited

The use of artificial intelligence in cyberattacks is now a growing concern. From the automated creation of malware to more sophisticated phishing campaigns, AI’s ability to enhance the scale and effectiveness of threats has become a cause for alarm. However, Version’s 2024 Data Breach Investigations Report (DBIR) states that only 2% of analyzed data breaches directly involved the use of this technology.

Not All Surprises Are Sweet: 5 Hidden Cyber Threats

At first glance, a donut is harmless, maybe even delightful. But take a bite, and you might find something unexpected inside. Raspberry? Custard? Malware? Okay, maybe not malware (hopefully), but that’s exactly how many cyber threats operate: they hide in plain sight, waiting for the moment you drop your guard. This Donut Day, we’re taking a light-hearted look at five cyber threats that appear harmless but pack a punch.

What Is Endpoint Policy Management? Why Intune isn't enough

Most IT and security teams think they already have endpoint policy management in place. They’re using Microsoft Intune. Maybe Defender. Maybe a mix of Mobile Device Management, AV, and EDR. But here’s the catch: delivering policies isn’t the same as enforcing them.

From Detection to Action: How Thomas Murray Transformed Their Incident Response with LimaCharlie

Join us for an exclusive behind-the-scenes look at how Thomas Murray, a global risk intelligence company, enhanced their security operations using LimaCharlie's SecOps Cloud Platform. In this technical deep dive, Thomas Murray's security expert Guillermo Roman, demonstrates how they've leveraged LimaCharlie's platform to enhance their security operations. By implementing custom automation workflows, Thomas Murray has achieved significant reductions in incident response times.