WatchGuard

How to protect the corporate network from spyware
It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

Zero day malware reached an all-time high of 74% in Q1 2021
74% of threats detected in Q1 2021 were zero day malware – or those for which a signature-based antivirus solution did not detect at the time of the malware release – capable …

Why XSS is still an XXL issue in 2021
Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …
WatchGuard adds endpoint security product family into WatchGuard Cloud
WatchGuard announced that it has integrated the WatchGuard endpoint security product family – previously known as Panda Adaptive Defense 360, Adaptive Defense, Endpoint …

New infosec products of the week: May 21, 2021
ReversingLabs Malware Lab: Detect, classify, analyze, and respond to malicious files Designed to support modern security organizations increasingly delegating malware analysis …
WatchGuard releases endpoint security for Windows on Qualcomm Snapdragon PCs
WatchGuard announced that it’s releasing endpoint security for use on Windows-based 5G- and 4G LTE-enabled PCs powered by Qualcomm Snapdragon compute platforms with its Panda …

Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT
Fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019, according …
WatchGuard Cloud: Delivering simplified security management for MSPs
WatchGuard has announced new capabilities that make WatchGuard Cloud the ideal security platform for managed service providers (MSPs). With a new single, centralised interface …

A closer look at fileless malware, beyond the network
Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to …
WatchGuard’s Firebox M series appliances provide simplified, extensive and flexible security
WatchGuard announced the release of its new Firebox M4800 and M5800 appliances. These new firewalls provide the powerful performance, security services and flexibility …

How COVID-19 has impacted the security threat landscape
A WatchGuard report reveals how COVID-19 has impacted the security threat landscape, with evidence that attackers continue to target corporate networks despite the shift to …

Automation to shape cybersecurity activities in 2021
Automation will play a major role in shaping cybersecurity attack and defence activities in 2021, WatchGuard predicts. Traditionally a high-investment, high-return targeted …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility