Skip to main content
Close search
  • Log In
  • Contact Us
  • Global Sites

    Français
    Deutsch
    Italiano
    Português
    Español
    日本語
Home
  • Back

    Platform

    • Platform Overview

    • Unified Security Platform
    • Unified Security Agent
    • Centralized Management

    • AI-Powered XDR

    • RMM & PSA Integrations
    • Compliance Reports

    • Managed Services for MSPs

    • Managed Detection & Response

    • Security Operations Center (SOC)
    • Network Security

    • Firewalls

    • Firewall Security Services

    • Network Detection & Response (NDR)

    • Secure Wi-Fi
    • Endpoint Security

    • Comprehensive EDR

    • Foundational EDR

    • Endpoint Protection & Next-Gen AV

    • Endpoint Security Modules

    • Identity Security

    • Multi-Factor Authentication (MFA)

    • Single Sign-On (SSO)
    • Hardware Token

    • Zero Trust
    • Secure Access Service Edge (SASE)
    • View All Products

  • Back

    Why WatchGuard

    • Why WatchGuard
    • WatchGuard vs The Competition
    • Compare SonicWall
    • Compare Microsoft
    • Compare Fortinet
    • Compare Sophos
    • Compare CrowdStrike
    • Case Studies
    • Case Studies
    • Partner Success Stories
    • Solutions

    • Industries

    • Regulations

    • Organizations
    • Security Models
    • spacer
    • Industry Recognition

    • Awards & Recognition

    • Customer Reviews

    • Compliance & Regulations

  • Back

    Learn

    • Cybersecurity 101
    • AI & Automation
    • Cyber Attacks & Threats
    • Endpoint Security
    • VPN
    • Managed Detection & Response

    • Blogs
    • Corporate News Blog
    • Product & Support Blog
    • Secplicity
    • Threat Lab
    • Internet Security Report
    • Threat Landscape
    • Ransomware Tracker
    • The 443 Podcast
    • Cybersecurity Trends
    • SD-WAN
    • XDR Security
    • Zero Trust Security
    • MSP vs MSSP
    • Webinars & Events
    • Register for a Webinar
    • Upcoming Live Demos
    • On Demand Webinars
    • Help Me Buy
    • Demos & Free Trials
    • Find a Reseller
    • Online Store (Renewals Only)
    • View All Resources
  • Back

    Company

    • News Room

    • Press Releases

    • Press Coverage

    • Corporate News Blog

    • Webinars & Events
    • Awards & Recognition

    • Media Contacts

    • About WatchGuard

    • Leadership
    • 30 Years of Innovation

    • Real Security for the Real World
    • Social Responsibility

    • Careers

    • WatchGuard Brand Partners
    • Seattle Kraken
    • Girona FC
    • Trust Center
    • PSIRT
    • Product Certifications
  • Back

    Partners

    • Partners
    • Become a Partner

    • Channel Partner Program

    • Benefits for the MSP

    • Getting Started as a Partner

    • Join the WatchGuardONE Program

    • Partner Resources

    • WatchGuard Cloud for Partners

    • Unified Security Platform for Partners

    • Specializations & Certifications

    • Partner Tools

    • Partner Success Stories

    • Find A Partner

    • Find a Reseller

    • Find a Distributor

  • Back

    Support

    • Support
    • Technical Resources

    • Technical Search

    • User Forums

    • Technical Documentation

    • Product & Support Blog

    • Software Downloads

    • Security Portal

    • Training

    • Certification

    • WatchGuard Learning Center
    • Locate a Training Partner

    • Training Schedule

    • Video Tutorials

    • Support Services

    • Hire an Expert

    • Support Levels

    • Additional Support Services

    • spacer
    • Security Advisory List
    • Status Dashboard
  • Close search
  • Try Now
Open mobile navigation menu

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Cybersecurity Hub
  • Internet Security Report
  • Threat Landscape
  • Ransomware Tracker
  • Secplicity Blog
  • The 443 Podcast

What Attackers Hope You Miss and How AI Is Making It Worse

30 March 2026 By The Editor
SOC analyst cyber threat monitoring

In Episode 363 of The 443 Podcast, Corey Nachreiner speaks with Kristen Yang, Cybersecurity Analyst & Investigations Lead, about the threats security teams should be paying closest attention to right now. The conversation reinforces an uncomfortable truth for defenders: many successful attacks still…

Read more

Ransomware Tracker (Entry #308): The Green Blood Group

27 March 2026 By Ryan Estes
The Green Blood Group DLS Landing Page

The Green Blood Group was both the group name and the encryptor name of this operation. The group, or threat actor, operated for about a month, between January 2026 and February 2026. Although it's likely operations began shortly before that, possibly towards the end of 2025. During that time, at…

Read more

New BianLian Ransomware Activity Detected: SVG Phishing Campaign Targeting Venezuelan Companies

25 March 2026 By Euler Neto
Phishing email attack concept showing a malicious attachment hooking into a laptop, representing SVG-based ransomware delivery

WatchGuard telemetry identified some malicious files being downloaded by victims, and almost all of them originated in Venezuela, indicating a possible malicious campaign targeting companies in this country. The malicious files are distributed via phishing emails that have a SVG file with a filename…

Read more

Stryker’s Network Disruption Signals a Dangerous New Phase in Cyber Threats

24 March 2026 By The Editor
Stryker’s Network Disruption Signals a Dangerous New Phase in Cyber Threats

In Episode 362 on The 443 Podcast , Marc and Corey unpack three stories that point to a hard truth for defenders: cyber threats are becoming more disruptive, more deceptive, and more scalable. From a major attack affecting medical technology giant Stryker, to a once-legitimate Chrome extension…

Read more

The Security Gap That Lets Attackers Walk Right In

12 March 2026 By Andrew Kerr
Isometric illustration of a hacking attack or security breach

If you ask most security-conscious organizations about their priorities, the answers are usually familiar: endpoint detection and response, identity and access management, network segmentation, cloud security, vulnerability management, and more. On paper, many teams know exactly what strong security…

Read more

AI-Powered Cyber Attacks Are Rising: What Security Teams Need to Know

10 March 2026 By The Editor
Digital illustration of an AI-powered cyber threat showing a robotic figure beside icons representing security, JWT vulnerabilities, and GitHub pipeline attacks.

The cybersecurity landscape is shifting quickly. In Episode 361 of The443 Podcast, Marc Laliberte and Corey Nachreiner discuss three emerging issues shaping modern security: A critical authentication bypass in a popular JSON Web Token (JWT) library An autonomous AI bot exploiting GitHub repositories…

Read more

Pagination

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • About Us
  • Contact Us
  • Real Security
  • Careers
  • Product List & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie Policy
  • Privacy Policy
  • Manage Email Preferences
LinkedIn X Facebook Instagram YouTube

Email Us

Copyright © 1996-2026 WatchGuard Technologies, Inc. All Rights Reserved.
Terms of Use | California Collection Notice | Do Not Sell or Share My Personal Information