SOURCE Secplicity – Security Simplified

  • LockBit Ransomware Group Introduces Bug Bounties and More

    LockBit Ransomware Group Introduces Bug Bounties and More

    The LockBit ransomware group has unveiled a new website – LockBit 3.0 – to host their ransom extortions and data leaks. The website includes several new features, including an unprecedented bug...

    Read Article
  • Grading Gartner’s Guesses

    Grading Gartner’s Guesses

    This week on the podcast, we discuss two recent security reports, one on the topic of open source software and the other on “insecure by design” in the Operational Technology (OT) space. We go...

    Read Article
  • 200th Episode Extravaganza

    200th Episode Extravaganza

    In celebration of our 200th episode, this week on the podcast we take a look back at the last few years and revisit some of our favorite episodes. Along the way, we’ll give updates on a few of our...

    Read Article
  • Robux Ransomware

    Robux Ransomware

    This week on the podcast we cover the latest and most bizarre ransomware extortion demand we’ve seen in recent memory. Before that though, we cover the latest updates on nation state hacking...

    Read Article
  • 0-Days for Days

    0-Days for Days

    This week on the podcast we cover two fresh 0-day vulnerabilities, one in Windows and another in Atlassian’s Confluence, both under active exploitation in the wild. Additionally, we cover Costa...

    Read Article
  • Package Hijacking

    Package Hijacking

    This week on the podcast, we discuss the line between ethical security research and malicious activity thanks to a compromised open source software package. After that we cover the latest industry...

    Read Article
  • WatchGuard Launches PSIRT Page

    WatchGuard Launches PSIRT Page

    WatchGuard’s Product Security Incident Response Team (PSIRT) has launched our public PSIRT page to provide a consolidated resource where network administrators can find advisories and information...

    Read Article
  • Building Security Strategies with Matt Lee

    Building Security Strategies with Matt Lee

    This week on the podcast we sit down for a chat with Matt Lee, Sr. Director of Security and Compliance at Pax8 and well-known cyber security educator, to discuss security strategies for MSPs and...

    Read Article
  • CISA Guidance for MSPs

    CISA Guidance for MSPs

    This week on the podcast we walk through CISA alert AA222-131A which gives bulleted guidance to MSPs and customers of MSPs on how to navigate their relationship security as threats targeting...

    Read Article
  • The REturn of REvil?

    The REturn of REvil?

    This week on the podcast we discuss the latest rumblings around the return of the prolific ransomware-as-a-service organization REvil. Before that though, we dive in to the latest tools, tactics...

    Read Article
  • Most Exploited Vulnerabilities of 2021

    Most Exploited Vulnerabilities of 2021

    This week on the podcast, we dive into CISA’s list of the 15 most exploited vulnerabilities in 2021. We’ll walk through each flaw and give a refresher on their history and how attackers have...

    Read Article
  • Psychic Signatures

    Psychic Signatures

    This week on the podcast we cover a critical and easily-exploited vulnerability in how some recent versions of Java handle cryptography. We also discuss the latest in a series of alerts from CISA...

    Read Article
  • Hidden Hafnium

    Hidden Hafnium

    This week on the podcast, we cover the latest evasion and persistence techniques from the state-sponsored threat actors known as Hafnium. Then, we dive into the world of ICS and SCADA devices to...

    Read Article
  • Patch Management Lag

    Patch Management Lag

    This week on the podcast we discuss one of the most rampant yet easily resolved risks facing many organizations today, not installing vendor-supplied security fixes. We’ll cover some of the...

    Read Article
  • For the Love of InfoSec, Don’t Over-Expose Administrative Management Portals

    For the Love of InfoSec, Don’t Over-Expose Administrative Management Portals

    When talking to IT and Security professionals, everyone seems to know they shouldn’t overly-expose management portals. And yet, every year we learn some new statistic showing tens of thousands of...

    Read Article
  • The Rise and Fall of Lapsus$

    The Rise and Fall of Lapsus$

    This week on the podcast we cover the hacking organization Lapsus$ including their tactics, targets, and how they ended up with several members arrested last week. After that, we cover the cyber...

    Read Article
  • Sharing Cyclops Blink Threat Intelligence with the Community

    Sharing Cyclops Blink Threat Intelligence with the Community

    At WatchGuard, we understand the importance of sharing threat intelligence with the information security (infosec) community when safe and appropriate. Not only does this information sharing help...

    Read Article
  • SATCOM Security

    SATCOM Security

    This week on the podcast, we cover a CISA alert on securing satellite communications (SATCOM) in the wake of several recent incidents involving providers and networks in eastern Europe. After...

    Read Article
  • US-Backed Cryptocurrency

    US-Backed Cryptocurrency

    This week on the podcast, we cover last week’s Executive Order from the White House that lays the foundation for a United States Central Bank Digital Currency, or CBDC, and what it means for the...

    Read Article
  • Conti Leaks

    Conti Leaks

    This week on the podcast we cover the recent leaks highlighting the inner workings of the Conti ransomware group that started with chat logs and grew to entire source code dumps. We then round out...

    Read Article
  • loading
    Loading More...