Salta al contenuto principale
Open mobile navigation menu
  • Log In
  • Contattaci
  • Siti internazionali

    Français
    Deutsch
    Português
    Español
    English
    日本語
Home
  • Indietro

    Piattaforma

    • Piattaforma
    • Unified Security Platform
    • Unified Security Agent
    • Gestione centralizzata
    • XDR basato sull'IA
    • Integrazioni RMM & PSA
    • Report sulla conformità
    • Servizi gestiti per i MSP
    • Rilevamento e risposta gestiti
    • Security Operations Center
    • Sicurezza di Rete
    • Firewalls
    • Servizi di sicurezza firewall
    • Network Detection & Response (NDR)
    • Secure Wi-Fi
    • Endpoint Security
    • Rilevamento e risposta degli endpoint
    • Moduli di sicurezza degli endpoint
    • Protezione dell'identità
    • Autenticazione a più fattori (MFA)
    • Total Identity Security
    • Token hardware AuthPoint
    • Zero Trust
    • Secure Access Service Edge (SASE)
    • Guarda tutti i prodotti
  • Indietro

    Perché WatchGuard?

    • Perché WatchGuard?
    • WatchGuard contro la concorrenza
    • Confrontare SonicWall
    • Confrontare Microsoft
    • Confrontare Fortinet
    • Confrontare Sophos
    • Confrontare CrowdStrike
    • Storia di successo
    • Storia di successo
    • Storie di successo dei partner
    • Soluzioni
    • Settori
    • Organizzazioni
    • spacer
    • Riconoscimenti nel settore
    • Premi e Riconoscimenti
    • Recensioni dei clienti
    • Conformità e regolamenti
  • Indietro

    Impara

    • Cybersicurezza 101
    • IA & Automazione
    • Attacchi informatici e minacce
    • Endpoint Security
    • VPN
    • Rilevamento e risposta gestiti
    • Blog
    • Blog aziendale
    • Blog di Prodotto e Supporto
    • Secplicity
    • Threat Lab
    • Internet Security Report
    • Ransomware Tracker
    • The 443 Podcast
    • Trend di cybersecurity
    • SD-WAN
    • Sicurezza XDR
    • Sicurezza Zero Trust
    • Confronto tra MSP e MSSP
    • Webinar ed eventi
    • Iscriviti a un webinar
    • Demo live in arrivo
    • Webinar su richiesta
    • Visualizza tutte le risorse
  • Indietro

    Azienda

    • Sala Stampa
    • Comunicati stampa
    • Copertura stampa
    • Blog aziendale
    • Webinar ed eventi
    • Premi e Riconoscimenti
    • Contatti media
    • Informazioni su WatchGuard
    • Team esecutivo
    • 30 anni di innovazione
    • Real Security for the Real World
    • Opportunità di lavoro
    • Partner del marchio WatchGuard
    • Seattle Kraken
    • Girona FC
    • Trust Center
    • PSIRT
    • Certificazioni dei prodotti
  • Indietro

    Partner

    • Partner
    • Unisciti al WatchGuardONE
    • Programma WatchGuardONE
    • Programma WatchGuardONE MSP
    • Successo del Partner
    • Vantaggi di WatchGuardONE
    • Storie di successo dei partner
    • Partner Connect
    • Trova un rivenditore
    • Trova un distributore
  • Indietro

    Supporto

    • Supporto
    • Technical Resources
    • Technical Search
    • User Forums
    • Technical Documentation
    • Product and Support Blog
    • Software Downloads
    • Security Portal
    • Training
    • Certification
    • WatchGuard Learning Center
    • Locate a Training Partner
    • Training Schedule
    • Video Tutorials
    • Support Services
    • Hire an Expert
    • Support Levels
    • Additional Support Services
    • spacer
    • Security Advisory List
    • Status Dashboard
  • Close search
  • Prova ora
Close search
  • Soluzioni
  • Prodotti & Servizi
  • Ricerca
  • Programma partner
  • Supporto
  • Azienda
  • Opportunità di lavoro
  • Accesso al Portale
  • Contattaci
  • Prova ora

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Hub di sicurezza informatica
  • Internet Security Report
  • Ransomware Tracker
  • Secplicity Blog
  • The 443 Podcast

A New Windows Zero-Day Lets Attackers Take Full Control

23 Aprile 2026 Di Krisaly Enriquez
Hand interacting with a digital cybersecurity interface showing biometric authentication and system access controls

A newly disclosed Windows zero-day, dubbed RedSun, is the latest reminder that attackers do not need to break in if they can simply escalate. Discussed in Episode 367 of The 443 podcast, this vulnerability highlights how trusted system processes can be manipulated to gain full system-level access…

Leggi tutto

FormBook Malware Analysis: Phishing Campaigns Use DLL Side-Loading and Obfuscated JavaScript to Target Businesses

20 Aprile 2026 Di Euler Neto
Person using a laptop with a warning overlay showing a suspicious email icon, representing a phishing or malware attack.

WatchGuard telemetry identified two different phishing campaigns targeting Greek, Spanish, Slovenian, Bosnian and Latin and Central American companies, that use different techniques to delivery FormBook malware. FormBook is a data-stealing malware that targets Windows systems, primarily distributed…

Leggi tutto

Project Glasswing Signals a New Era for AI in Cybersecurity

15 Aprile 2026 Di Krisaly Enriquez
exploding red lock on a glowing tile

Artificial intelligence is no longer just a productivity multiplier. It is becoming a force multiplier for cybersecurity, and potentially for cyber risk. In Episode 366 of The 443, Marc Laliberte and Corey Nachreiner discuss three developments that together paint a clear picture of where the…

Leggi tutto

Claude Code’s Accidental Source Leak Shows How Fast Attackers Exploit Curiosity

13 Aprile 2026 Di Krisaly Enriquez
red alert triangle above a mobile phone screen

When a high-profile code leak hits the internet, the first reaction is usually fascination. Developers want to inspect it. Researchers want to understand how it works. Security teams want to know whether the exposure creates downstream risk. But threat actors often move faster than all three. That…

Leggi tutto

Deepfakes Didn’t Invent Cybercrime, They Just Perfected It

06 Aprile 2026 Di Ricardo Arroyo
Deepfake concept ,Facial tracking, detection and recognition technology, Security system. Cyber security and Security password login online concept.

Fraud is nothing new. It is a reality that some people will take advantage of the trusting and even minimally naïve. Last year, in a moment of high stress and low sleep, even I, a 25-year Cyber Security veteran, was duped by a phone call from the “FBI” claiming my involvement in identity theft…

Leggi tutto

OAuth Phishing, Foreign Router Risks, and the Rise of Identity-Based Cyber Attacks

01 Aprile 2026 Di The Editor
Person identity concept with fingerprint and code

Most organizations are still focused on stopping attackers at the perimeter. But that’s not how modern attacks are working anymore. In Episode 364 of the 443 Podcast, three stories stood out not as isolated incidents, but as signals of a broader shift in how attackers operate: A potential US ban on…

Leggi tutto

Paginazione

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • Chi siamo
  • Contattaci
  • Real Security
  • Opportunità di lavoro
  • Lista prodotti e SKU
  • Kit Media & Brand
  • Supporto
  • Trust Center
  • PSIRT
  • Politica sui cookie
  • Informativa sulla privacy
  • Gestisci le preferenze e-mail
LinkedIn X Facebook Instagram YouTube

Scrivici

Siti internazionali

Français
Deutsch
Português
Español
English
日本語

Copyright © 1996-2026 WatchGuard Technologies, Inc. tutti i diritti riservati. Terms of Use >