Secplicity Blog
Cybersecurity Headlines & Trends Explained
New Phishing Attacks Stealing MFA Tokens Too
In the Firebox Feed, our threat intelligence feed powered by WatchGuard Firebox customers around the world, we recently came across a trending phishing campaign that uses a malicious PDF as part of its attack. Targeting mostly German users, the PDF comes attached to an email with a subject line that…
Green Mountain Grill Security Analysis
Automated smokers like the Green Mountain Grill (GMG) Davy Crockett are great for smoking different meats and other foods without having to tend the grill during the entire process. GMG has pushed this idea further with a WIFI controller that monitors and controls the grill. Now, one doesn’t even…
Source Code Analysis: Exobot
WatchGuard recently released its Internet Security Report (ISR) for Q4 2018. In addition to the many interesting details of malware attacks, IPS hits, and top security incidents, there is also a Threat Research section that covers the Exobot malware campaign. You can listen to The 443 Podcast’s…
Phishing Passwords With Maersk, Microsoft and Adobe
We recently discovered a sharp increase in a particular phishing scam while reviewing threat intelligence from the Firebox feed, our threat data from Firebox appliances around the world. Its primary targets were in Germany and Italy, but we also found some instances of the campaign in the Asian…
How Data Moves Across a Network
Building on the Networking Basics article previously written and a high-level overview of How Servers Serve Content, I wanted to write about how data actually moves over a network. That is, what happens when a user on a network node communicates with another networked node. There are two main models…
How Servers Serve Content
Computers seem to be virtually limitless in their abilities – they can send and receive digital information, serve content via many defined protocols, compute algorithms much faster than a human can, and even provide countless hours of fun and entertainment. One very common use of computers is…