Author: admin

Healthcare Data Incident

Oct 25, 2019 Security by admin
In June 2019, The Methodist Hospitals, Inc. identified unusual activities within employee email accounts. They immediately started an investigation, working with third-party forensic investigators to assess the scope of the issue at hand. On August 7, 2019, the investigation revealed that two employees fell victim to a phishing email that allowed an unauthorized actor access to their
Read More

Data Leak: Travel, Hospitality, and Government

Oct 25, 2019 Security by admin
Noam Rotem and Ran Locar of vpnMentor’s research team recently discovered an unsecure and unencrypted online database. This database belongs to AutoClerk, a reservations management system. Best Western Hotels and Resort Group had just bought AutoClerk prior to this discovery. The total size of the database was over 179GB of data. Exposed data includes sensitive information, such as full
Read More

You Hack Me, I Hack You

Oct 25, 2019 Security by admin
Is it ever appropriate to hack the hacker who hacked you? That is, is it ever right to hack back in retaliation? I’ll leave that question up to you but technically it is still illegal. However, in one case a victim-turned-vigilante not only served their own justice, but also shared some love with the impacted community as
Read More

New variations of the EMOTET Trojan surface

Jun 25, 2019 Security by admin
First identified in 2014, EMOTET was a troublesome malware trojan used to steal data from banking institutions. According to researchers from Trend Micro, new variants were found spreading via spam bots this August. SC Magazine reports that the new EMOTET variants have been targeting multiple geographical regions, each able to drop a different payload and spread in
Read More

Prevent Employees From Falling For Phishing Attacks

Jun 25, 2019 Security by admin
According to the 2019 Verizon Data Breach Investigation Report, a full third of cyber attacks involve phishing tactics. While there is evidence that employee education and phishing prevention solutions are effective in stopping basic phishing attempts, attackers have responded by making phishing emails more sophisticated and convincing. Examples include targeted spear phishing messages based on victim’s
Read More

Firebox Gateway Antivirus Engine Upgrade

Jun 25, 2019 Security by admin
This notice impacts Fireware v12.1 and earlier. Fireware versions 12.1.1 and later are not affected. This year, WatchGuard will upgrade the engine used to power the Gateway AntiVirus (GAV) service. To continue to use Gateway AV, you must upgrade your Firebox to the latest version of Fireware (or a minimum of Fireware v12.1.1). WatchGuard recommends you
Read More

The Top Cyber Threats Businesses Face Today

Jan 8, 2019 Security by admin
As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that
Read More

2019 Security Predictions

Jan 8, 2019 Security by admin
Next year, a hacktivist organization or nation-state will launch a coordinated attack against the infrastructure of the internet.The industry already saw the impact of an attack against a critical piece of internet infrastructure when a DDoS attack against DNS hosting provider, Dyn, took down many popular websites including Twitter, Reddit, and Amazon.com. Around the same
Read More

Cyber Defense Global Awards 2018

Jan 8, 2019 Security by admin
WatchGuard’s AuthPoint and Firebox M270 have again made headlines, this time winning honors in Cyber Defense Magazine’s Cyber Defense Global Awards 2018! AuthPoint was recognized as a Leader in the Multi-Factor Authentication category, and the Firebox M270 was also named a Leader for Unified Threat Management (UTM). The Cyber Defense Global Awards program is a new
Read More

libssh Vulnerability: Is WatchGuard Affected?

Nov 6, 2018 Security by admin
When users hear or read “SSH” (the acronym stands for Secure SHell) they expect it to be just that – a secure shell from your physical location to wherever the destination computer may be; and “secured” in terms of requiring authentication and verification of messages. The programming libraries that support SSH include OpenSSH and libssh
Read More