Direkt zum Inhalt
Open mobile navigation menu
  • Log In
  • |
  • Kontakt
Home
  • Lösungen

    Toggle Menu
    • Cybersecurity Trends

      ›
    • SD-WAN

    • XDR Security

    • Zero-Trust-Sicherheit

    • MSP vs MSSP

    • Für Unternehmen

      ›
    • Branchen

    • Regulierungen

    • Unternehmen

    • Sicherheitsmodelle

    • Für MSPs

      ›
    • Sicherheits-Tech-Stack

    • Security Frameworks

    • Cyber-Versicherungen
    • Für SOCs

      ›
    • Das moderne SOC

    • Threat Hunting

    • Unified Security Platform ›
    • Vereinfachen Sie Ihre Sicherheit.
  • Produkte und Services

    Toggle Menu
    • Netzwerksicherheit

      ›
    • Firewalls

    • Firewall Security Services

    • Secure Access Service Edge (SASE)
    • Network Detection & Response (NDR)

    • Sicheres WLAN
    • Endpoint-Security

      ›
    • Endpoint Detection & Response (EDR)

    • Endpoint Protection & Anti-Virus (AV)

    • Patch Management & Datensicherheit

    • DNS-Schutz auf DNS-Ebene

    • Identity Security

      ›
    • Multifaktor-Authentifizierung (MFA)

    • Single Sign-on (SSO)
    • AuthPoint Hardware-Token

    • Plattform-Sicherheit

      ›
    • KI-gesteuerte XDR

    • Cloud-Management

    • Compliance-Berichte

    • Security Operations Center
    • Managed Services für MSPs

      ›
    • Managed Detection & Response

    • Alle Produkte Anzeigen

      ›
  • Recherche

    Toggle Menu
    • Threat Lab ›
    • Internet Security Report
    • Bedrohungslandschaft
    • Ransomware-Tracker
    • Secplicity Blog
    • The 443 Podcast
    • Produkt-Ressourcen

      ›
    • On-Demand-Webinare

    • White Papers

    • Datenblätter und Broschüren

    • Referenzen

    • Auswählen

    • UTM vs NGFW

    • WatchGuard Appliance Sizing Tool

    • Vergleich WatchGuard Appliances

    • Integration Finden
    • Kaufen

      ›
    • Demos & kostenlose Tests

    • Reseller finden

  • Partner

    Toggle Menu
    • Partner werden

    • Channel-Partner-Programm

    • Vorteile für MSPs

    • Erste Schritte als Partner

    • Am WatchGuardONE-Programm teilnehmen

    • Partnerressourcen

    • WatchGuard Cloud für Partner

    • Unified Security Platform für Partner

    • Spezialisierungen und Zertifizierungen

    • Partner-Tools

    • Partner-Erfolgsgeschichten

    • Einen Partner Finden

    • Reseller finden

    • Distributor finden

    Handshake with images of people superimposed inside the silhouette
    Werden Sie noch heute zum WatchGuardONE-Partner

    Jetzt teilnehmen

  • News

    Toggle Menu
    • WatchGuard News

      ›
    • Pressemitteilungen

    • Schlagzeilen

    • Unternehmens-News-Blog

    • Aktuelle Webinare & Veranstaltungen
    • Awards und Auszeichnungen

    • Media Kontakte

    • Über WatchGuard

      ›
    • Führungsteam

    • Real Security for the Real World
    • Soziale Verantwortung

    • Veranstaltungen

    • Karrieren

    • WatchGuard Markenpartner
    • Seattle Kraken
    • Girona FC
    Women of WatchGuard
    WatchGuard Karriere
    Ihr neues Team wartet auf Sie

    Team Red beitreten

  • Support

    Toggle Menu
    • Technical Resources
    • Technical Search
    • User Forums
    • Technical Documentation
    • Product and Support Blog
    • Software Downloads
    • Security Portal
    • Training ›
    • Certification
    • WatchGuard Learning Center
    • Locate a Training Partner
    • Training Schedule
    • Video Tutorials
    • Support Services ›
    • Hire an Expert
    • Support Levels
    • Additional Support Services
    • Security Advisory List ›
    • Status Dashboard ›
    Person touching icons on a floating screen
    Manage Your Support Services
    Products, user profile, cloud services, and more
    Log In
  • Close search
  • Globale Webseiten

    Français
    Italiano
    Português
    Español
    English
    日本語
  • Testen!
Close search
  • Lösungen
  • Produkte und Services
  • Recherche
  • Partner-Programm
  • Support
  • News
  • Karrieren
  • Portal Login
  • Kontaktieren Sie uns
  • Testen!

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Cybersecurity-Hub
  • Internet Security Report
  • Bedrohungslandschaft
  • Ransomware-Tracker
  • Secplicity Blog
  • The 443 Podcast

Cyberattacks Are Coming Thick and Fast – M&S, Now Jaguar Land Rover… Who’s Next?

08 September 2025 Von Martin Lethbridge
Unlocked Image

First it was Marks & Spencer. Then the Co-op and Harrods. Now the UK’s biggest carmaker, Jaguar Land Rover, has been hit by a cyber incident that has knocked out production lines and disrupted sales right at one of the busiest times of the year. It feels like these attacks are no longer isolated…

Mehr lesen

Cyber Crime Campaign for AppSuite PDF Editor

29 August 2025 Von Kristen Yang
Img_Blog_Malware_Trends.jpg

WatchGuard has recently received reports of a cyber crime campaign underway where a weaponized version of a free PDF editor software “AppSuite PDF Editor” has been distributed to multiple sites for users to unknowingly download and run on their systems. It has been made aware of that the threat…

Mehr lesen

Why Are We Still Reusing Passwords? KNP's Collapse Is a Brutal Reminder

24 Juli 2025 Von Martin Lethbridge
A sign in page

Let’s stop pretending this is new. It is 2025. We have had years, decades of advice, warnings, and horror stories about password security. And still, people are reusing passwords like it is 2005. We are not talking about random Internet users, either. We are talking about businesses, infrastructure…

Mehr lesen

Configuration of IT-Security solutions matter – and sometimes a single parameter can cause big trouble

02 Juli 2025 Von Jonas Spieckermann
Ransomware Image

Sometimes supposedly small things make a huge difference. This can also be true in cyber security configurations. In recent weeks, multiple partners described very similar cyber attacks their customers faced, and in some cases, the criminals were unfortunately even successful in compromising…

Mehr lesen

Why Many Companies Still Use WPA2 And Why It's Time to Move On

20 Juni 2025 Von Martin Lethbridge
WiFi cloud with a lock in the middle

In the ever-evolving world of cybersecurity, one area that often gets overlooked is Wi-Fi security. Despite major advances, a surprising number of companies still rely on WPA2 (Wi-Fi Protected Access 2) to secure their wireless networks. As of 2024, approximately 60% of companies continue to use…

Mehr lesen

Ransomware Tracker (Entry #258): NailaoLocker

18 Juni 2025 Von Ryan Estes
WatchGuard logo

Entry: https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/nailaolocker Analysis for NailaoLocker was first unveiled by researchers from the Orange Cyberdefense CERT and Trend Micro in mid-February 2025. In addition to a technical analysis of the NailaoLocker, it also included analyses…

Mehr lesen

Seitennummerierung

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • Über uns
  • Kontaktieren Sie uns
  • Real Security
  • Karrieren
  • Produktliste & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie-Richtlinie
  • Datenschutzrichtlinie
  • E-Mail-Präferenzen verwalten
LinkedIn X Facebook Instagram YouTube

Schreiben Sie uns

Globale Webseiten

Français
Italiano
Português
Español
English
日本語

Copyright © 1996-2025 WatchGuard Technologies, Inc. Alle Rechte vorbehalten. Terms of Use >