Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 443 Episode 220 - Hacking Hyundai

On this week's episode, we cover the latest in car hacking, this time involving a vulnerability that could have given remote attackers full control over certain Hyundai models' doors, lights and engine. After that, we discuss the latest breach impacting a major password management app and how it's different from previous ones we've seen. We end with a discussion on the latest 'custom security solution' vendor selling spyware tools for profit.

MFA is the authentication method of choice for 83% of companies

Passwords are the most widespread form of authentication on different platforms and systems. Still, companies and users often do not prioritize creating strong passwords and continue to opt for simple and very weak passwords in the eyes of cybercrime professionals.

How MSPs can boost the adoption of unified security

Adopting robust processes to identify, classify, remediate, and mitigate vulnerabilities before attackers can exploit them is a new imperative in corporate environments. An efficient, proactive cybersecurity strategy must be multi-layered and able to consider challenges from all angles. Although increasing the number of solutions deployed to protect the attack surface may appear to be the answer, the opposite is true.

Wi-Fi in WatchGuard Cloud - Unboxing the AP332CR

Watch as Sr Sales Engineer, Martin Lethbridge, unboxes WatchGuard’s AP332CR and offers tips for connecting it to a network. IP67-rated and designed for mid-density, rugged/outdoor deployments, the AP332CR includes a dual-band radio with four external, omnidirectional antennas offering up to 1.2 Gbps on the 5 GHz band. Utilizing WatchGuard Cloud for deployment and configuration, the AP332CR offers a seamless experience with Wi-Fi 6 performance and WPA3 encryption.

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.

The 443 Episode 219 - CISA Incident Response Learnings

On today's episode we cover a pair of alerts from the Cybersecurity Infrastructure and Security Agency (CISA), one detailing the tools, tactics and procedures from a prolific ransomware organization and another walking through a recent incident response engagement CISA completed with a federal agency. Before that though, we learn about what happens when you use a software component that hasn't received updates in 17 years.

Why endpoint security and MFA should always go together

The current cyberattack landscape has forced companies to look for new forms of protection, which is why they are increasingly resorting to the use of cyber insurance. The figures are alarming: 148,104 malware attacks are launched every day, which translates into 6,172 attacks per hour. The consequences of a breach can mean dedicating a large part of a company’s resources to restoring computer systems and dealing with any ensuing penalties and lawsuits.

Modern SOCs and MDR Services Series: 6 Benefits and Why They Matter

The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a SOC: detecting, analyzing, and responding to security incidents. These factors generate exponential growth in data volume and security alerts, which teams need more resources to address.

The 443 Episode 218 - Attack Surface Management

This week on the podcast we dive into the world of attack surface management. We discuss what your attack surface is made up of including some areas you may not have thought of and then cover the best ways to reduce and ultimately protect it. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

80% of companies experience security incidents in the Cloud

Migrating to the Cloud brings many advantages for companies. First of all, they reduce their operating costs by almost 40%. They also increase their agility, reduce the maintenance time of traditional IT infrastructures, and gain flexibility and scalability. However, as the number of workloads deployed in the Cloud grows, more and more organizations are struggling to keep pace with security requirements.