Secplicity Blog
Cybersecurity Headlines & Trends Explained
WatchGuard’s Q4 2017 Internet Security Report Released; Malicious Office Document Usage on the Rise
Today, WatchGuard Technologies released its quarterly Internet Security Report covering Q4 2017. Every quarter we examine anonymized data from our Firebox UTM appliances all across the world and report on the most common malware variants and network attacks that our appliances block. This gives…
WatchGuard’s Q3 2017 Internet Security Report
Today, we’re pleased to announce the release of WatchGuard’s Internet Security Report for Q3 2017! Every quarter, WatchGuard’s Threat Lab looks forward to diving into Firebox Feed data from tens of thousands of live Firebox appliances across the globe to produce a report on the latest security…
Indicators of RDP Brute Force Attacks
I have been investigating an incident involving two EC2 instances on AWS that were infected with ransomware, cryptocurrency miners, and other types of malware. Sounds scary, right?! Well actually, the approaches that the attackers took to get onto the hosts do not appear to be that sophisticated…
WatchGuard’s Q2 2017 Internet Security Report
Today, we are releasing our Internet Security Report for Q2 2017. Each quarter, we analyze data from our Firebox UTM appliances deployed around the world in order to determine the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises…
WatchGuard's Q1 2017 Internet Security Report
Today, I am excited to announce our Internet Security Report for Q1 2017. Each quarter, we examine data from our UTM appliances around the world in order to analyze the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. In our…
Historical Cryptography Ciphers
Like most technologies, encryption has evolved throughout the years from simple origins. While modern encryption relies on complex computational operations, older encryption ciphers were rudimentary and easy to break. Regardless of each cipher’s strength, all encryption methods share a common goal…