03.02.2026 12:06
Heise_alerts
03.02.2026 09:43
02.02.2026 14:13
02.02.2026 14:06
02.02.2026 09:34
02.02.2026 09:26
Heise_security
03.02.2026 18:22
03.02.2026 12:06
03.02.2026 09:43
02.02.2026 17:48
02.02.2026 14:13
02.02.2026 14:06
Watchguard_blog
02.02.2026 21:18
CRN recognizes nine WatchGuard leaders on the 2026 Channel Chiefs list, honoring their impact on partner success, innovation, and channel growth worldwide.
29.01.2026 04:18
Zero Trust is no longer just a security model. It is a practical way for organizations to reduce data exposure, enforce least privilege, and prove control across users, devices, and access, while staying ready for modern privacy pressures.
29.01.2026 04:18
As margins tighten, MSPs need smarter security. See how WatchGuard integrations cut noise, automate tickets, sync assets, and scale your security practice.
27.01.2026 04:05
Workplace privacy depends on employees and strong controls. As AI-driven threats grow, organizations must combine training and security to reduce risk.
27.01.2026 04:05
A practical guide for SMBs: four cybersecurity and data privacy priorities, including MFA, endpoints, unified security, and MDR.
24.01.2026 04:03
Why mid-market security must assume breaches will happen. Learn how Zero Trust, EDR, MFA, and 24/7 monitoring reduce real-world risk.
Watchguard_pressreleases
16.01.2026 04:12
Open MDR delivers unified visibility and rapid response across WatchGuard and third-party environments, removing the constraints of single-vendor security models and accelerating MSP time to market
17.12.2025 00:00
A decade of zero trust complexity finally simplified through a unified approach built for MSPs and organizations of every size
10.12.2025 00:00
WatchGuard delivers full coverage with almost no noise in MITRE ATT&CK ER7 testing, giving MSPs stronger protection, faster response, and lower operational burden.
20.11.2025 00:00
High partner turnout and strong session engagement signal accelerating demand for advanced security strategies across global MSP market
13.11.2025 00:00
Company’s rapid release cadence and new product launches mark a major step forward in delivering “Real Security for the Real World”
05.11.2025 00:00
Veteran industry executive with decades of experience scaling technology firms to build on record performance and drive the next phase of expansion
Csoonline
03.02.2026 00:00
03.02.2026 00:00
02.02.2026 00:00
02.02.2026 00:00
02.02.2026 00:00
01.02.2026 00:00
Secplicity
14.01.2026 18:17
Introduction At the turn of the year, we were alerted to a doppelganger domain impersonating WatchGuard’s Mobile VPN with SSL, delivering a malicious spoofed client to steal credentials. Navigating directly to the doppelganger domain resulted in a benign informational WatchGuard VPN page. However…
17.10.2025 00:00
A new ransomware operation known as Kyber has emerged. Their first and current only posted victim is L3Harris, a major defense contractor in the United States. The operators have provided a timer that ends around 6 PM EST on Sunday, October 19. The group claims to have stolen over 300 GB of data…
16.10.2025 00:00
The first samples of the new(ish) White Lock ransomware began emerging towards the end of September. The earliest compilation time stamp of the four samples currently on MalwareBazaar, Triage, and VirusTotal is September 29, 2025. It has all the hallmarks of traditional crypto-ransomware: kills anti…
16.10.2025 00:00
Entry: https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/dan0n The dAn0n Hacker Group, or dAn0n, was first observed in the Spring of 2024. They posted their first victim on their simultaneous dark web and clear net data leak site on March 26. The dAn0n group is often lumped in with…
01.10.2025 00:00
The past 18 months have been shaped by a surge in brute-force attacks and critical vulnerabilities (CVEs) targeting VPNs, authentication services, privilege elevation, and denial of service across the network security landscape. This timeline outlines key advisories and CVEs beginning with Cisco…
19.09.2025 00:00
Cyberattacks have become the new normal, but 2025 has been particularly brutal for UK businesses. We’re not even through the year, and already four major incidents have shaken industries, disrupted communities, and forced us to think harder about how we deal with cyber threats. Here’s what’s…
Thehackernews
31.12.2026 00:00
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa Consortium, the holding company behind a commercial spyware known as Predator , from the specially designated nationals list. The names of the individuals are as follows - Merom Harpaz Andrea Nicola Constantino Hermes Gambazzi Sara Aleksandra Fayssal Hamou Hamou was sanctioned by OFAC in March 2024, and Harpaz and Gambazzi were targeted in September 2024 in connection with developing, operating, and distributing Predator. It's currently not known why they were removed from the list. Harpaz is said to be working as a manager of Intellexa S.A., while Gambazzi was identified as the owner of Thalestris Limited and Intellexa Limited. Thalestris, Treasury Department said, held the distribution rights to the spyware, and processed transactions on behalf of other entities within the Intellexa Consortium. It's also the parent company...
31.12.2026 00:00
IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The vulnerability, tracked as CVE-2025-13915 , is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. It has been described as an authentication bypass flaw. "IBM API Connect could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application," the tech giant said in a bulletin. The shortcoming affects the following versions of IBM API Connect - 10.0.8.0 through 10.0.8.5 10.0.11.0 Customers are advised to follow the steps outlined below - Download the fix from Fix Central Extract the files: Readme.md and ibm-apiconnect-<version>-ifix.13195.tar.gz Apply the fix based on the appropriate API Connect version "Customers unable to install the interim fix should disable self-service sign-up on their Developer Portal if enabled, which will help minimise their exp...
31.12.2026 00:00
Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight modifications from the previous wave observed last month. The npm package that embeds the novel Shai Hulud strain is " @vietmoney/react-big-calendar ," which was uploaded to npm back in March 2021 by a user named "hoquocdat." It was updated for the first time on December 28, 2025, to version 0.26.2. The package has been downloaded 698 times since its initial publication. The latest version has been downloaded 197 times. Aikido, which spotted the package, said it has not spotted any major spread or infections following the release of the package. "This suggests we may have caught the attackers testing their payload," security researcher Charlie Eriksen said . "The differences in the code suggests that this was obfuscated again from the original source, not modified in place. This makes it highly unlikely to be a copy-ca...
31.12.2026 00:00
Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was likely responsible for the hack of its Google Chrome extension, ultimately resulting in the theft of approximately $8.5 million in assets. "Our Developer GitHub secrets were exposed in the attack, which gave the attacker access to our browser extension source code and the Chrome Web Store (CWS) API key," the company said in a post-mortem published Tuesday. "The attacker obtained full CWS API access via the leaked key, allowing builds to be uploaded directly without Trust Wallet's standard release process, which requires internal approval/manual review." Subsequently, the attacker is said to have registered the domain "metrics-trustwallet[.]com" and pushed a trojanized version of the extension with a backdoor that's capable of harvesting users' wallet mnemonic phrases to the sub-domain "api.metrics-...
31.12.2026 00:00
The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster , has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox. The activity is assessed to be the work of a Chinese threat actor that Koi Security is tracking under the moniker DarkSpectre . In all, the campaigns have collectively affected over 8.8 million users spanning a period of more than seven years. ShadyPanda was first unmasked by the cybersecurity company earlier this month as targeting all three browser users to facilitate data theft, search query hijacking, and affiliate fraud. It has been found to affect 5.6 million users, including 1.3 newly identified victims stemming from over 100 extensions flagged as connected to the same cluster. This also includes an Edge add-on named "New Tab - Customized Dashboard" that features a logic bomb that waits for three days prior to t...
30.12.2026 00:00
The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail email software that could be exploited to achieve remote code execution. The vulnerability, tracked as CVE-2025-52691 , carries a CVSS score of 10.0. It relates to a case of arbitrary file upload that could enable code execution without requiring any authentication. "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution," CSA said. Vulnerabilities of this kind allow the upload of dangerous file types that are automatically processed within an application's environment. This could pave the way for code execution if the uploaded file is interpreted and executed as code, as is the case with PHP files. In a hypothetical attack scenario, a bad actor could weaponize this vulnerability to place malici...
Borncity
04.02.2026 00:00
Werbung – Das Zero-Trust-Modell ist heute essenziell für Cybersicherheit. Es minimiert menschliche Fehler und bietet maximalen Schutz in einer sich ständig verändernden digitalen Welt. Doch ein zentraler Punkt wird oft übersehen: der Schutz des Active Directory (AD).
03.02.2026 00:00
Es ist mutmaßlich eine gute Nachricht für IT-Leute, die früher Geräte beim Anbieter Tandberg gekauft haben. Das Unternehmen wurde ja bereits Anfang 2025 geschlossen. Jetzt gibt es die Meldung, dass Tandberg weiter geht. Es gibt eine Firma in Norwegen, die die Geschäfte weiterführen sollen.
03.02.2026 00:00
Die Sicherheitsupdates vom 13. Januar 2026 für Windows verursachen Probleme mit dem Herunterfahren und dem Ruhemodus. Das hatte Microsoft in einem Known Issues-Supportbeitrag zum 15. Januar 2026 bestätigt und ein Out-of-Band-Update mit einem Fix für Windows 11 23H2 veröffentlicht. Jetzt hat Microsoft bestätigt, dass mehr Windows-Systeme betroffen sind.
03.02.2026 00:00
Noch eine kurze Information für Administratoren von Exchange Online-Tenants. Microsoft hat gerade die Verfügbarkeit der optimierten Moderationsgenehmigungen in allen Outlook-Clients bekannt gegeben. Zudem gibt es eine Funktion zur Konsolidierung von Genehmigungsnachrichten. Mit diesen Updates sollen Moderatoren von einer größeren Flexibilität profitieren.
03.02.2026 00:00
Kurze Information und auch Frage in die Runde, ob jemand aus der Leserschaft betroffen ist. Ein Leser hat mich informiert – zum heutigen 3. Februar 2026 deutet sich eine Störung beim Hoster Hetzner an. Aber auch das Online-Banking der Ing ist wohl beeinträchtigt – habe ich selbst überprüft. Bei Hetzner wird bisher noch nichts bezüglich einer Störung gemeldet. Hier ein schneller Überblick über die Sachlage. Ergänzung: Die Störung bei Hetzner sollte behoben sein.
03.02.2026 00:00
Einige Nutzer des beliebten Windows-Editor Notepad++ wurde Opfer von staatsnahen Hackern. Diesen war es gelungen, von Sommer 2025 den Update-Mechanismus zu kompromittieren und Malware auszuliefern.