Salta al contenuto principale
Open mobile navigation menu
  • Log In
  • Contattaci
  • Siti internazionali

    Français
    Deutsch
    Português
    Español
    English
    日本語
Home
  • Indietro

    Piattaforma

    • Piattaforma
    • Unified Security Platform
    • Unified Security Agent
    • Gestione centralizzata
    • XDR basato sull'IA
    • Integrazioni RMM & PSA
    • Report sulla conformità
    • Servizi gestiti per i MSP
    • Rilevamento e risposta gestiti
    • Security Operations Center
    • Sicurezza di Rete
    • Firewalls
    • Servizi di sicurezza firewall
    • Network Detection & Response (NDR)
    • Secure Wi-Fi
    • Endpoint Security
    • Rilevamento e risposta degli endpoint
    • Moduli di sicurezza degli endpoint
    • Protezione dell'identità
    • Autenticazione a più fattori (MFA)
    • Total Identity Security
    • Token hardware AuthPoint
    • Zero Trust
    • Secure Access Service Edge (SASE)
    • Guarda tutti i prodotti
  • Indietro

    Perché WatchGuard?

    • Perché WatchGuard?
    • WatchGuard contro la concorrenza
    • Confrontare SonicWall
    • Confrontare Microsoft
    • Confrontare Fortinet
    • Confrontare Sophos
    • Confrontare CrowdStrike
    • Storia di successo
    • Storia di successo
    • Storie di successo dei partner
    • Soluzioni
    • Settori
    • Organizzazioni
    • spacer
    • Riconoscimenti nel settore
    • Premi e Riconoscimenti
    • Recensioni dei clienti
    • Conformità e regolamenti
  • Indietro

    Impara

    • Cybersicurezza 101
    • IA & Automazione
    • Attacchi informatici e minacce
    • Endpoint Security
    • VPN
    • Rilevamento e risposta gestiti
    • Blog
    • Blog aziendale
    • Blog di Prodotto e Supporto
    • Secplicity
    • Threat Lab
    • Internet Security Report
    • Ransomware Tracker
    • The 443 Podcast
    • Trend di cybersecurity
    • SD-WAN
    • Sicurezza XDR
    • Sicurezza Zero Trust
    • Confronto tra MSP e MSSP
    • Webinar ed eventi
    • Iscriviti a un webinar
    • Demo live in arrivo
    • Webinar su richiesta
    • Visualizza tutte le risorse
  • Indietro

    Azienda

    • Sala Stampa
    • Comunicati stampa
    • Copertura stampa
    • Blog aziendale
    • Webinar ed eventi
    • Premi e Riconoscimenti
    • Contatti media
    • Informazioni su WatchGuard
    • Team esecutivo
    • 30 anni di innovazione
    • Real Security for the Real World
    • Opportunità di lavoro
    • Partner del marchio WatchGuard
    • Seattle Kraken
    • Girona FC
    • Trust Center
    • PSIRT
    • Certificazioni dei prodotti
  • Indietro

    Partner

    • Partner
    • Unisciti al WatchGuardONE
    • Programma WatchGuardONE
    • Programma WatchGuardONE MSP
    • Successo del Partner
    • Vantaggi di WatchGuardONE
    • Storie di successo dei partner
    • Partner Connect
    • Trova un rivenditore
    • Trova un distributore
  • Indietro

    Supporto

    • Supporto
    • Technical Resources
    • Technical Search
    • User Forums
    • Technical Documentation
    • Product and Support Blog
    • Software Downloads
    • Security Portal
    • Training
    • Certification
    • WatchGuard Learning Center
    • Locate a Training Partner
    • Training Schedule
    • Video Tutorials
    • Support Services
    • Hire an Expert
    • Support Levels
    • Additional Support Services
    • spacer
    • Security Advisory List
    • Status Dashboard
  • Close search
  • Prova ora
Close search
  • Soluzioni
  • Prodotti & Servizi
  • Ricerca
  • Programma partner
  • Supporto
  • Azienda
  • Opportunità di lavoro
  • Accesso al Portale
  • Contattaci
  • Prova ora

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Hub di sicurezza informatica
  • Internet Security Report
  • Ransomware Tracker
  • Secplicity Blog
  • The 443 Podcast

The Security Gap That Lets Attackers Walk Right In

12 Marzo 2026 Di Andrew Kerr
Isometric illustration of a hacking attack or security breach

If you ask most security-conscious organizations about their priorities, the answers are usually familiar: endpoint detection and response, identity and access management, network segmentation, cloud security, vulnerability management, and more. On paper, many teams know exactly what strong security…

Leggi tutto

AI-Powered Cyber Attacks Are Rising: What Security Teams Need to Know

10 Marzo 2026 Di Corey Nachreiner
Digital illustration of an AI-powered cyber threat showing a robotic figure beside icons representing security, JWT vulnerabilities, and GitHub pipeline attacks.

The cybersecurity landscape is shifting quickly. In Episode 361 of The443 Podcast, Marc Laliberte and Corey Nachreiner discuss three emerging issues shaping modern security: A critical authentication bypass in a popular JSON Web Token (JWT) library An autonomous AI bot exploiting GitHub repositories…

Leggi tutto

Cisco SD-WAN 0-Day: What MSPs Should Do Now

09 Marzo 2026 Di Marc Laliberte
Hands typing on a laptop with a digital shield and lock overlay, representing network security.

Three stories, one theme: control planes, supply chains, and human workflows remain high-leverage targets. This Secplicity blog follows the sequence and details covered by Marc Laliberte and Corey Nachreiner in The443 Podcast Episode 360. 1) Cisco Catalyst SD-WAN 0-Day (CVSS 10): What happened Cisco…

Leggi tutto

Why CMMC Is Important in 2026: Simplified

09 Marzo 2026 Di Martin Lethbridge
Cybersecurity compliance concept showing digital certification shield and secure network on laptop, representing CMMC requirements for defense contractors

Let’s be honest: cybersecurity rules are not exactly thrilling. But if your company supports the U.S. Department of Defense (DoD), CMMC (Cybersecurity Maturity Model Certification) is becoming increasingly difficult to ignore. At its core, CMMC exists for one simple reason: to help ensure sensitive…

Leggi tutto

Ongoing Widespread Credential Harvesting Campaign Targets VPN Providers

13 Gennaio 2026 Di Ryan Estes
WatchGuard logo

Introduction At the turn of the year, we were alerted to a doppelganger domain impersonating WatchGuard’s Mobile VPN with SSL, delivering a malicious spoofed client to steal credentials. Navigating directly to the doppelganger domain resulted in a benign informational WatchGuard VPN page. However…

Leggi tutto

New Kyber Ransomware Posts U.S. Defense Contractor As First Victim

17 Ottobre 2025 Di Ryan Estes
WallOfWonders

A new ransomware operation known as Kyber has emerged. Their first and current only posted victim is L3Harris, a major defense contractor in the United States. The operators have provided a timer that ends around 6 PM EST on Sunday, October 19. The group claims to have stolen over 300 GB of data…

Leggi tutto

Paginazione

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • Chi siamo
  • Contattaci
  • Real Security
  • Opportunità di lavoro
  • Lista prodotti e SKU
  • Kit Media & Brand
  • Supporto
  • Trust Center
  • PSIRT
  • Politica sui cookie
  • Informativa sulla privacy
  • Gestisci le preferenze e-mail
LinkedIn X Facebook Instagram YouTube

Scrivici

Siti internazionali

Français
Deutsch
Português
Español
English
日本語

Copyright © 1996-2026 WatchGuard Technologies, Inc. tutti i diritti riservati. Terms of Use >