Security News

Training, endpoint management reduce remote working cybersecurity risks
2023-01-17 04:30

"The popularity of hybrid work, and the associated risks, means that companies must prioritise training and education to make remote working safe. Traditional methods of controlling and securing company data aren't as effective when employees are working in remote locations and greater responsibility falls on the individual. Companies must acknowledge the unique risks associated with remote work and activate relevant security management systems, as well as empower employees to deal with a certain level of risk," said Daniel Hofmann, CEO of Hornetsecurity. Hofmann commented: "Increasing remote working cybersecurity measures is particularly important in the current climate, as cybercriminals are becoming smarter and using remote working to their advantage. We've seen an increase in smartphone attacks as hackers understand that both personal and professional data can likely be accessed as people can, and often do, carry out work on personal devices."

Get Unified Cloud and Endpoint Security: Only $1 for 1,000 Assets for all of 2023!
2023-01-13 10:00

Starting now, for just $1, you can get comprehensive agentless and runtime cloud security coverage for all of 2023, covering up to 1,000 eligible assets. Steve Shedlock, Incident Response Team Lead at SEIC, says, "I would not want to do security anywhere without the level of visibility that Uptycs provides."

How micro-VMs can protect your most vulnerable endpoints
2022-11-08 04:00

Over 80% of home-office routers were found to be vulnerable to potential cyberattacks. When it comes to these cyberattacks, malware remains a major concern.

Raspberry Robin Operators Selling Cybercriminals Access to Thousands of Endpoints
2022-10-28 10:18

The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot, and Clop ransomware. MSTIC is keeping tabs on the activity group behind the USB-based Raspberry Robin infections as DEV-0856, adding it's aware of at least four confirmed entry points that all have the likely end goal of deploying ransomware.

Microsoft Defender for Endpoint will turn on tamper protection by default
2022-09-20 12:54

Microsoft says tamper protection will soon be turned on by default for all enterprise customers in Microsoft Defender for Endpoint for better defense against ransomware attacks.Once toggled on, it locks Microsoft Defender Antivirus to secure default values and will prevent any security settings changes.

Securing your Apple device front through unified endpoint management
2022-09-19 04:36

Any discussion about device management would not be complete without talking about unified endpoint management solutions. Apple Business Manager or ABM helps configure and deploy Apple devices, so why should you spend more resources upgrading to a dedicated UEM? To put it simply, the access to capabilities that a UEM provides is unrivaled.

Shape-shifting cryptominer savages Linux endpoints and IoT
2022-09-10 11:00

AT&T cybersecurity researchers have discovered a sneaky piece of malware targeting Linux endpoints and IoT devices in the hopes of gaining persistent access and turning victims into crypto-mining drones. Popular adventure clothing brand The North Face and shoe company Vans, subsidiaries of the same parent company, have admitted to a credential stuffing attack that netted its attacker 194,905 user's worth of PII. Most every piece of PII stored on the two websites were compromised, with the exception of credit card numbers, which the brands' parent company VF Outdoors said it doesn't store on its sites.

Considerations for Evaluating Endpoint Detection and Response (EDR) Solutions
2022-08-26 00:00

Endpoint security solutions range from signature-based endpoint protection platform or antivirus solutions to extended detection and response platforms that tie multiple security solutions together. Organizations that are evaluating endpoint detection and response solutions need to ensure that the products they are considering will meet their needs in the areas.

A lack of endpoint security strategy is leaving enterprises open to attack
2022-08-25 08:00

49% of respondents to a recent Twitter poll carried out by Osirium Technologies describe endpoint management security within their organization as non-existent. This Help Net Security video highlights why so many organizations lack endpoint security strategy.

Highlighting What should be Patched First at the Endpoint
2022-08-24 14:01

While this Global Threat Landscape Report is filled with information, charts, and graphs, one area of interest to security leaders is Figure 3 titled "Comparing CVEs by IPS activity and endpoint detections." CVE stands for "Common Vulnerabilities and Exposures" and it is a list of publicly disclosed computer security flaws. These vulnerabilities could well be attacked next and should be patched before other less-likely vulnerabilities are.