How to allocate budget for a well-rounded cybersecurity portfolio

Getting the C-levels to approve an IT security budget is probably one of the most difficult and exasperating tasks that security professionals and IT managers have to do each year. Information security doesn’t contribute directly to the bottom line in … Continue reading How to allocate budget for a well-rounded cybersecurity portfolio

Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular Linux-based cryptocurrency miner. This is just one of several signs that malicious … Continue reading Cryptocurrency miners poised for continued growth

Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized businesses (SMBs). You could probably guess why new security technology flows in t… Continue reading Are SMBs driving the adoption of security automation by enterprises?

Macro-less word document attacks on the rise

WatchGuard released its Internet Security Report for Q4 2017. Among the report’s most notable findings, threat intelligence showed that total malware attacks are up by 33 percent, and that cyber criminals are increasingly leveraging Microsoft Off… Continue reading Macro-less word document attacks on the rise

Love letters from a Black Hat to all the fools on the Internet

As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs and working to pay off college loans. This Valentine’s Day I want to sh… Continue reading Love letters from a Black Hat to all the fools on the Internet

Script-based attacks and overall malware on the rise

Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that scripting threats accounted for 68 percent of all malware during the period…. Continue reading Script-based attacks and overall malware on the rise

Hacking virtual and augmented reality: Short-term FUD, long-term danger

I believe virtual reality (VR) and augmented reality (AR) are on the cusp of mass success, and will dramatically change the way we use technology. However, with new technology comes new attack surfaces. After watching security researchers and attackers pick apart the Internet of Things (IoT) so easily, it would be foolish not to consider the security of new technologies. So that begs the question; what are the risks of virtual and augmented reality? To … More Continue reading Hacking virtual and augmented reality: Short-term FUD, long-term danger

Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things (IoT). Schneier argued that neither IoT buyers nor sellers care about a device’s security. Sellers are interested in quickly releasing inexpensive products to market, while buyers only care about getting cool gadgets for cheap. This unhealthy and unsecure IoT market results in incidents like the Mirai botnet, in which … More Continue reading Where does the cyber security buck stop?

What resellers think about threats to customers

A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views of more than 1,400 WatchGuard partner organizations across the globe. What threats do resellers think customers are most concerned about? According to the survey, 83 percent of resellers believe that ransomware will be their customers’ largest concern this year. In addition, 16 percent believe the majority of their customers would … More Continue reading What resellers think about threats to customers

Will 2017 be the year of ransomworm?

It’s safe to say that 2016 was the year of ransomware. More specifically, the year of crypto-ransomware, that nefarious variant that encrypts files and holds them captive until a ransom is paid. Since the release of Cryptolocker in late 2013, crypto-ransomware has exploded, and 2016 was a banner year. As a matter of fact, according to the FBI, cyber criminals used ransomware to steal more than $209 million from U.S. businesses in just the first … More Continue reading Will 2017 be the year of ransomworm?