Secplicity Blog
Cybersecurity Headlines & Trends Explained
Cybercrime Has Entered the Physical Supply Chain
Cybercrime no longer stays neatly contained behind a screen. In Episode 369 of The 443 Podcast, Marc Laliberte and Corey Nachreiner unpack three recent threat stories that show how digital compromise can ripple outward into software supply chains, ransomware recovery, and even stolen freight…
The Cybersecurity Reality Facing LATAM SMBs
For many small and midsize businesses across Latin America, cybersecurity is no longer a future concern. It is a present operational risk. Episode 368 of The 443: Security Simplified features WatchGuard’s Marc Laliberte and Corey Nachreiner in conversation with Paul Harris, CEO of BGLA and Futurity…
A New Windows Zero-Day Lets Attackers Take Full Control
A newly disclosed Windows zero-day, dubbed RedSun, is the latest reminder that attackers do not need to break in if they can simply escalate. Discussed in Episode 367 of The 443 podcast, this vulnerability highlights how trusted system processes can be manipulated to gain full system-level access…
FormBook Malware Analysis: Phishing Campaigns Use DLL Side-Loading and Obfuscated JavaScript to Target Businesses
WatchGuard telemetry identified two different phishing campaigns targeting Greek, Spanish, Slovenian, Bosnian and Latin and Central American companies, that use different techniques to delivery FormBook malware. FormBook is a data-stealing malware that targets Windows systems, primarily distributed…
Project Glasswing Signals a New Era for AI in Cybersecurity
Artificial intelligence is no longer just a productivity multiplier. It is becoming a force multiplier for cybersecurity, and potentially for cyber risk. In Episode 366 of The 443, Marc Laliberte and Corey Nachreiner discuss three developments that together paint a clear picture of where the…
Claude Code’s Accidental Source Leak Shows How Fast Attackers Exploit Curiosity
When a high-profile code leak hits the internet, the first reaction is usually fascination. Developers want to inspect it. Researchers want to understand how it works. Security teams want to know whether the exposure creates downstream risk. But threat actors often move faster than all three. That…