Direkt zum Inhalt
Open mobile navigation menu
  • Anmelden
  • Kontakt
  • Globale Webseiten

    Français
    Italiano
    Português
    Español
    English
    日本語
Home
  • Zurück

    Plattform

    • Plattform
    • Unified Security Platform
    • Unified Security Agent
    • Zentralisiertes Management
    • KI-gesteuerte XDR
    • RMM & PSA-Integrationen
    • Compliance-Berichte
    • Managed Services für MSPs
    • Managed Detection & Response
    • Security Operations Center (SOC)
    • Netzwerksicherheit
    • Firewalls
    • Firewall Security Services
    • Network Detection & Response (NDR)
    • Sicheres WLAN
    • Endpoint-Security
    • Endpunkterkennung und Reaktion
    • Module für Endpoint Security
    • Identity Security
    • Multifaktor-Authentifizierung (MFA)
    • Total Identity Security
    • AuthPoint Hardware-Token
    • Zero Trust
    • Secure Access Service Edge (SASE)
    • Alle Produkte Anzeigen
  • Zurück

    Warum WatchGuard?

    • Warum WatchGuard?
    • WatchGuard im Vergleich zur Konkurrenz
    • Vergleichen SonicWall
    • Vergleichen Microsoft
    • Vergleichen Fortinet
    • Vergleichen Sophos
    • Vergleichen CrowdStrike
    • Referenzen
    • Referenzen
    • Partner-Erfolgsgeschichten
    • Lösungen
    • Branchen
    • Unternehmen
    • spacer
    • Branchenerkennung
    • Awards und Auszeichnungen
    • Kundenbewertungen
    • Einhaltung & Vorschriften
  • Zurück

    Lernen

    • Cybersicherheit 101
    • KI & Automatisierung
    • Cyberangriffe & Bedrohungen
    • Endpoint-Security
    • VPN
    • Managed Detection & Response
    • Blogs
    • Unternehmens-News-Blog
    • Produkt- und Support-Blog
    • Secplicity
    • Threat Lab
    • Internet Security Report
    • Ransomware-Tracker
    • The 443 Podcast
    • Cybersecurity Trends
    • SD-WAN
    • XDR Security
    • Zero-Trust-Sicherheit
    • MSP vs MSSP
    • Webinare & Veranstaltungen
    • Melden Sie sich für ein Webinar an
    • Kommende Live-Demos
    • On-Demand-Webinare
    • Alle Ressourcen anzeigen
  • Zurück

    Unternehmen

    • Nachrichtenraum
    • Pressemitteilungen
    • Schlagzeilen
    • Unternehmens-News-Blog
    • Webinare & Veranstaltungen
    • Awards und Auszeichnungen
    • Media Kontakte
    • Über WatchGuard
    • Führungsteam
    • 30 Jahre Innovation
    • Real Security for the Real World
    • Karrieren
    • WatchGuard Markenpartner
    • Seattle Kraken
    • Girona FC
    • Trust Center
    • PSIRT
    • Produktzertifizierungen
  • Zurück

    Partner

    • Partner
    • Am WatchGuardONE teilnehmen
    • WatchGuardONE-Programm
    • WatchGuardONE MSP-Programm
    • Partnererfolg
    • Vorteile von WatchGuardONE
    • Partner-Erfolgsgeschichten
    • Partner Connect
    • Reseller finden
    • Distributor finden
  • Zurück

    Support

    • Support
    • Technical Resources
    • Technical Search
    • User Forums
    • Technical Documentation
    • Product and Support Blog
    • Software Downloads
    • Security Portal
    • Training
    • Certification
    • WatchGuard Learning Center
    • Locate a Training Partner
    • Training Schedule
    • Video Tutorials
    • Support Services
    • Hire an Expert
    • Support Levels
    • Additional Support Services
    • spacer
    • Security Advisory List
    • Status Dashboard
  • Close search
  • Testen!
Close search
  • Lösungen
  • Produkte und Services
  • Recherche
  • Partner-Programm
  • Support
  • Unternehmen
  • Karrieren
  • Portal Login
  • Kontaktieren Sie uns
  • Testen!

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Cybersecurity-Hub
  • Internet Security Report
  • Ransomware-Tracker
  • Secplicity Blog
  • The 443 Podcast

A New Windows Zero-Day Lets Attackers Take Full Control

23 April 2026 Von Krisaly Enriquez
Hand interacting with a digital cybersecurity interface showing biometric authentication and system access controls

A newly disclosed Windows zero-day, dubbed RedSun, is the latest reminder that attackers do not need to break in if they can simply escalate. Discussed in Episode 367 of The 443 podcast, this vulnerability highlights how trusted system processes can be manipulated to gain full system-level access…

Mehr lesen

FormBook Malware Analysis: Phishing Campaigns Use DLL Side-Loading and Obfuscated JavaScript to Target Businesses

20 April 2026 Von Euler Neto
Person using a laptop with a warning overlay showing a suspicious email icon, representing a phishing or malware attack.

WatchGuard telemetry identified two different phishing campaigns targeting Greek, Spanish, Slovenian, Bosnian and Latin and Central American companies, that use different techniques to delivery FormBook malware. FormBook is a data-stealing malware that targets Windows systems, primarily distributed…

Mehr lesen

Project Glasswing Signals a New Era for AI in Cybersecurity

15 April 2026 Von Krisaly Enriquez
exploding red lock on a glowing tile

Artificial intelligence is no longer just a productivity multiplier. It is becoming a force multiplier for cybersecurity, and potentially for cyber risk. In Episode 366 of The 443, Marc Laliberte and Corey Nachreiner discuss three developments that together paint a clear picture of where the…

Mehr lesen

Claude Code’s Accidental Source Leak Shows How Fast Attackers Exploit Curiosity

13 April 2026 Von Krisaly Enriquez
red alert triangle above a mobile phone screen

When a high-profile code leak hits the internet, the first reaction is usually fascination. Developers want to inspect it. Researchers want to understand how it works. Security teams want to know whether the exposure creates downstream risk. But threat actors often move faster than all three. That…

Mehr lesen

Deepfakes Didn’t Invent Cybercrime, They Just Perfected It

06 April 2026 Von Ricardo Arroyo
Deepfake concept ,Facial tracking, detection and recognition technology, Security system. Cyber security and Security password login online concept.

Fraud is nothing new. It is a reality that some people will take advantage of the trusting and even minimally naïve. Last year, in a moment of high stress and low sleep, even I, a 25-year Cyber Security veteran, was duped by a phone call from the “FBI” claiming my involvement in identity theft…

Mehr lesen

OAuth Phishing, Foreign Router Risks, and the Rise of Identity-Based Cyber Attacks

01 April 2026 Von The Editor
Person identity concept with fingerprint and code

Most organizations are still focused on stopping attackers at the perimeter. But that’s not how modern attacks are working anymore. In Episode 364 of the 443 Podcast, three stories stood out not as isolated incidents, but as signals of a broader shift in how attackers operate: A potential US ban on…

Mehr lesen

Seitennummerierung

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • Über uns
  • Kontaktieren Sie uns
  • Real Security
  • Karrieren
  • Produktliste & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie-Richtlinie
  • Datenschutzrichtlinie
  • E-Mail-Präferenzen verwalten
LinkedIn X Facebook Instagram YouTube

Schreiben Sie uns

Globale Webseiten

Français
Italiano
Português
Español
English
日本語

Copyright © 1996-2026 WatchGuard Technologies, Inc. Alle Rechte vorbehalten. Terms of Use >