Security News

Fileless Malware Tops Critical Endpoint Threats for 1H 2020
2020-09-21 21:27

Cisco flagged threats like Kovter, Poweliks, Divergent and LemonDuck as the most common fileless malware. Another prevalent critical threat to endpoints in the first half was dual-use tools that are typically leveraged for both exploitation and post-exploitation tasks.

Elastic Security 7.9 delivers a major milestone toward endpoint security integrated into the Elastic Stack
2020-08-20 08:21

Elastic announced the first major beta milestone for Elastic in delivering comprehensive endpoint security fully integrated into the Elastic Stack, centrally managed under a unified agent and enabled with one click. Elastic Security also now offers expanded out-of-the-box protections for cloud security monitoring, as well as a new integration with IBM Security's security orchestration, automation, and response platform, IBM Security Resilient.

Trend Micro to offer comprehensive network and endpoint protection for IoT and 5G private networks
2020-08-19 02:30

Trend Micro announced its upcoming Mobile Network Security solution, which will accelerate digital innovation at the network edge by offering comprehensive network and endpoint protection for a new era of IoT and 5G private networks. "From shopping malls to airports and smart factories to enterprise campuses, private networks are emerging as an increasingly popular way to deliver business-critical applications at the network edge. However, the sheer complexity involved can create dangerous security gaps," said Akihiko Omikawa, executive vice president of IoT security for Trend Micro.

CIOs prioritizing IAM over endpoint security and security awareness training
2020-08-14 03:30

CIOs are prioritizing identity and access management over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. Their goals reflect these new priorities: 86% said they're aiming to improve security standards across their environment, while 80% are making their tech stack more flexible for remote and on-premise users.

Critical Flaws Affect Citrix Endpoint Management (XenMobile Servers)
2020-08-11 13:17

Citrix today released patches for multiple new security vulnerabilities affecting its Citrix Endpoint Management, also known as XenMobile, a product made for enterprises to help companies manage and secure their employees' mobile devices remotely. Citrix Endpoint Management offers businesses mobile device management and mobile application management capabilities.

How do I select an endpoint protection solution for my business?
2020-07-31 04:00

To select an appropriate endpoint protection solution for your business, you need to think about a variety of factors. As malicious actors target endpoints with new types of attacks designed to evade traditional endpoint prevention tools, organizations must seek out advanced endpoint detection and response solutions.

Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response
2020-07-29 13:00

Qualys today announced Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response, Qualys now brings the unifying power of its highly scalable cloud platform to EDR. Traditional EDR solutions singularly focus on endpoints' malicious activities to hunt and investigate cyberattacks. Multi-Vector EDR enables security teams to unify multiple context vectors like asset and software inventory, end-of-life visibility, vulnerabilities and exploits, misconfigurations, network traffic summary, MITRE ATT&CK tactics and techniques, malware, endpoint telemetry, and network reachability by leveraging the Qualys backend to correlate with threat intelligence for accurate detection, investigation and response - ALL, in a single, cloud-based app with a single lightweight agent.

Attivo Networks EDN enhancements prevent attackers from fingerprinting an endpoint
2020-07-23 00:00

Attivo Networks introduced new capabilities to its Endpoint Detection Net solution that prevent attackers from fingerprinting an endpoint to identify security weaknesses and from conducting reconnaissance. Attackers use fingerprinting to identify targets, decide which vulnerabilities to exploit, and determine how to successfully interact with them.

Most Companies Are Ignoring Your Most Vulnerable Endpoint…and It’s Not the Laptop
2020-07-14 13:00

A 2019 study found that most companies allow mobile devices to access between 1/3 and 3/4 of their most business-critical information. Cybercriminals know that mobile devices are less secure, so it's no surprise that last year Verizon found that 4 in 10 companies were breached through a mobile device.

Massive complexity endangers enterprise endpoint environments
2020-06-29 04:00

There's a massive amount of complexity plaguing today's enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices - up on average - is hindering IT and security's ability to maintain foundational security hygiene practices, such as patching critical vulnerabilities, which may actually weaken endpoint security defenses, Absolute reveals.