Secplicity Blog - Research

WatchGuard’s Q3 2017 Internet Security Report

WatchGuard logo

Today, we’re pleased to announce the release of WatchGuard’s Internet Security Report for Q3 2017! Every quarter, WatchGuard’s Threat Lab looks forward to diving into Firebox Feed data from tens of thousands of live Firebox appliances across the globe to produce a report on the latest security…

Indicators of RDP Brute Force Attacks

WatchGuard logo

I have been investigating an incident involving two EC2 instances on AWS that were infected with ransomware, cryptocurrency miners, and other types of malware. Sounds scary, right?! Well actually, the approaches that the attackers took to get onto the hosts do not appear to be that sophisticated…

WatchGuard’s Q2 2017 Internet Security Report

WatchGuard logo

Today, we are releasing our Internet Security Report for Q2 2017. Each quarter, we analyze data from our Firebox UTM appliances deployed around the world in order to determine the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises…

WatchGuard's Q1 2017 Internet Security Report

WatchGuard logo

Today, I am excited to announce our Internet Security Report for Q1 2017. Each quarter, we examine data from our UTM appliances around the world in order to analyze the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. In our…

Historical Cryptography Ciphers

WatchGuard logo

Like most technologies, encryption has evolved throughout the years from simple origins. While modern encryption relies on complex computational operations, older encryption ciphers were rudimentary and easy to break. Regardless of each cipher’s strength, all encryption methods share a common goal…

Once Stolen, What Do Hackers Do With Your Data?

WatchGuard logo

It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview…

Responsible Disclosure: Ouvis C2 HD Security Camera

WatchGuard logo

As a part of our ongoing IoT vulnerability research project, one of the recently tested devices included the Ouvis C2 HD Wireless Security Camera. This is a wireless camera which includes Android, iOS and browser-based remote viewing. Open Telnet Access Vulnerability After connecting an IoT device…

WatchGuard's Q4 2016 Internet Security Report

WatchGuard logo

Today, I am very excited to share WatchGuard's first formal Internet Security Report. For over a decade, WatchGuard's threat team has educated the general public and our customers about the latest threats, vulnerabilities, and security stories through articles, podcasts, and videos. In this new…

Responsible Disclosure: Amcrest View Web Portal

WatchGuard logo

Recently I purchased a number or IoT devices for a vulnerability research project. Among them was the Amcrest IPM-721S Wireless IP camera, a wireless pan-and-tilt camera, which at the time had 6,381 reviews on Amazon.com (interestingly, that number is down to 1,425 at the time of this writing)…