Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Outing Chinese Semiconductor Cyber Spies - The 443 Podcast - Episode 336

This week on the podcast, Corey Nachreiner and guest host Ryan Estes, from WatchGuard’s malware analysis team, cover the cybersecurity news for last week. We chat about AI-based site cloaking tools on the underground, how Domain Tools found potentially unwanted executables hiding in DNS TXT records, and a Chinese state-sponsored set of targeted phishing campaigns going after the Taiwanese semiconductor industry and its supply chain. Join us to learn more and discuss how we can protect ourselves from similar threats.

NIST's new LEV metric: How does it help companies?

The National Institute of Standards and Technology (NIST) has unveiled a new metric that promises to revolutionize the way vulnerability management is prioritized. Likely Exploited Vulnerabilities (LEV) is a ranking designed to help organizations focus their efforts on the flaws that cybercriminals are actively using to perpetrate real-world attacks. Thousands of vulnerabilities are reported every year but only a small fraction is exploited in the wild.

Alert fatigue? Manage alerts with AI and cybersecurity experts

In an environment where the volume of threats is growing and the pressure to protect critical assets is constant, oragnizations and managed service providers (MSPs) are inundated with notifications. Prioritizing critical vulnerabilities takes time, resources and careful analysis. However, false positives also slip into this constant flow of alerts. Far from being harmless, these false alarms can create an even bigger problem: alert fatigue.

WatchGuard's Q1 2025 Internet Security Report. - The 443 Podcast - Episode 335

This week on the podcast, Corey Nachreiner and guest host Ryan Estes from WatchGuard’s malware analysis team explore WatchGuard’s recently released Q1 Internet Security Report (ISR). As always with the ISR, we highlight the top malware, network attacks, and malicious domains that our products see, but with our guest host, the author of the Endpoint section, we dive much deeper into all the threats arriving at our customers’ endpoints. Listen in for the latest threat landscape trends and some practical tips to stay safe from the most recent threats.

DORA and NIS 2: Regulatory Compliance as a Competitive Advantage for MSPs

The evolution and growing impact of cyberthreats are increasingly impacting the economic and social fabric. From attacks on business infrastructures to political disinformation campaigns and ransomware targeting critical environments such as hospitals or transportation networks, the impact is no longer just technical; it’s systemic.

XDR vs. SIEM: Defeating Cyber Chaos

Cybersecurity decision-makers face a growing challenge: defending against a rising tide of threats without drowning in operational complexity. Designed for large security teams, SIEM platforms often introduce more chaos than clarity, burdening small teams with high costs, complex deployments, and overwhelming data. In this webinar, Stephen Helm and Ricardo Arroyo will discuss the core differences between SIEM and XDR (Extended Detection and Response) and explain why XDR is emerging as the smart, scalable choice for modern MSPs and lean IT security teams.

WatchGuard Report: Malware Explodes Across Network and Endpoints

In WatchGuard’s just-released Q1 2025 Internet Security Report, one thing is clear: attackers are getting faster, stealthier, and more sophisticated, powered by an underground boom in AI tools. The numbers speak for themselves: These insights paint a clear picture: evasive, AI-driven threats are reshaping the cybersecurity battlefield. Organizations must adapt with layered, intelligent, and proactive defenses to stay ahead.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.