Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

If you can't patch perfectly, patch programmatically

In every quarterly security report we’ve ever released, we consistently find that threat actors primarily exploit old vulnerabilities, often fixed months, if not years, prior. The prevalence of zero-day exploits pales in comparison to these well-known, outdated vulnerabilities. This reality underscores our repeated advice: regularly and swiftly patch your software to yield significant returns on your security work investment.

GhostGPT, the new malicious chatbot and its impact on cybersecurity

At this juncture, it is no surprise that cybercriminals are leveraging the potential of generative artificial intelligence to strengthen their attacks. However, the emergence of new models specifically designed to generate threats quickly has made this task even easier for bad actors. At the end of 2024, researchers discovered a new AI chatbot created for cybercriminal purposes.

WatchGuard Wins 2025 SC Award for Best Authentication Technology

We’re proud to share that WatchGuard Technologies has been named the Best Authentication Technology winner at the 2025 SC Awards! This recognition celebrates the innovation behind AuthPoint, our multi-factor authentication (MFA) solution that brings enterprise-grade identity protection to organizations of all sizes, especially those relying on lean IT teams or managed service providers (MSPs).

Weeding Out Cyber Threats: How to Detect and Stop Common Attacks

When necessary, you water it, monitor it, and weed out what doesn’t belong before it spreads. The same principle applies to cybersecurity. In today’s digital landscape, cyber threats evolve rapidly. From phishing and privilege escalation to rogue access and lateral movement, attacks often take root well before they’re discovered. That’s why detection and response are no longer optional ‒ essential for resilience.

World Password Day: The Hidden Cost of Compromised Credentials

Every year, World Password Day highlights the importance of strong credentials and password managers. But the real issue today isn't whether your password is complex enough—it's whether it's already been stolen and is for sale on the dark web. Millions of credentials are circulating in underground marketplaces like e-commerce platforms, complete with verified vendors, customer support, and full database access.

AI and Compliance with Adam Winston

This week on the podcast, we bring in Adam Winston, former CSO of ActZero and current Field CTO for Managed Services at WatchGuard to discuss automating the SOC with AI. We cover the history of AI in SecOps, the good and bad applications of AI and Machine Learning, what the future looks like, and how compliance might impact our ability to get there.