Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Podcast - Episode 248 - RepoJacking

On this week's podcast we discuss a recent analysis on the risks of GitHub RepoJacking. After that, we dive in to the Barracuda 0-day that China-based threat actors are actively exploiting as well as a novel command and control distribution method for a separate China-based APT. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below: The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

ChatGPT can create polymorphic malware, now what?

Despite the security controls that OpenAI has imposed on ChatGPT to try to make it a secure space capable of assisting users in a variety of tasks, cybercriminals have managed to exploit this technology for malicious purposes. Recent research has shown that this generative artificial intelligence is capable of creating a new branch of polymorphic malware with relative ease. The main risk lies in ChatGPT's versatility, which allows it to create code that could easily be used for malware.

How MSPs Can Overcome Common Zero Trust Obstacles

Zero trust is not a new cybersecurity concept, yet it seems everywhere lately. In case you’re unfamiliar with zero trust, it is defined as an approach to security that assumes no implicit trust between users, devices, or networks as a baseline, and once a user has been verified as legitimate, authorized, and trustworthy, access is allowed. Zero trust has been so effective as a cybersecurity strategy that the U.S.

5 Best Practices to Achieve a Trusted Wireless Environment

Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.

Tutorial: Get Started with Aliases and Exceptions Import

In this WatchGuard Support video, you'll learn how to import aliases and exceptions from a local-managed Firebox configuration file to a cloud-managed Firebox and Firebox templates in WatchGuard Cloud. Includes the import requirements, limitations and handling of duplicate entries.

The 443 Podcast - Episode 247 - A New Russian APT

On this week's episode we discuss the newly named threat actor Cadet Blizzard, including their typical tools, tactics and procedures. We also cover CISA's newest binding directive to federal agencies. Before that, we give an update on exploited MOVEit Transfer servers and the latest Bitcoin laundering technique.