Security News

Shape-shifting cryptominer savages Linux endpoints and IoT
2022-09-10 11:00

AT&T cybersecurity researchers have discovered a sneaky piece of malware targeting Linux endpoints and IoT devices in the hopes of gaining persistent access and turning victims into crypto-mining drones. Popular adventure clothing brand The North Face and shoe company Vans, subsidiaries of the same parent company, have admitted to a credential stuffing attack that netted its attacker 194,905 user's worth of PII. Most every piece of PII stored on the two websites were compromised, with the exception of credit card numbers, which the brands' parent company VF Outdoors said it doesn't store on its sites.

Considerations for Evaluating Endpoint Detection and Response (EDR) Solutions
2022-08-26 00:00

Endpoint security solutions range from signature-based endpoint protection platform or antivirus solutions to extended detection and response platforms that tie multiple security solutions together. Organizations that are evaluating endpoint detection and response solutions need to ensure that the products they are considering will meet their needs in the areas.

A lack of endpoint security strategy is leaving enterprises open to attack
2022-08-25 08:00

49% of respondents to a recent Twitter poll carried out by Osirium Technologies describe endpoint management security within their organization as non-existent. This Help Net Security video highlights why so many organizations lack endpoint security strategy.

Highlighting What should be Patched First at the Endpoint
2022-08-24 14:01

While this Global Threat Landscape Report is filled with information, charts, and graphs, one area of interest to security leaders is Figure 3 titled "Comparing CVEs by IPS activity and endpoint detections." CVE stands for "Common Vulnerabilities and Exposures" and it is a list of publicly disclosed computer security flaws. These vulnerabilities could well be attacked next and should be patched before other less-likely vulnerabilities are.

Microsoft makes tamper protection for macOS endpoints widely available
2022-08-17 10:33

The tamper protection feature in Microsoft Defender for Endpoint for macOS is getting rolled out to all customers, the company has announced on Monday. "While in Audit mode, TP signals can be viewed via Advanced Hunting and in local on-device logs. No tampering alerts are raised in the Security Center while in Audit mode. Alerts are raised in the portal only in block mode," explained Camilla Sophie Djamalov, a Program Manager Intern at Microsoft.

Kolide is an endpoint security solution for teams that want to meet their compliance goals without sacrificing privacy.
2022-08-17 00:00

If you're considering a third-party audit like SOC 2 or ISO 27001, you should be prepared to answer some tough questions about endpoint security. If you're not sure how you'll answer those questions, then you need Kolide.

How aware are organizations of the importance of endpoint management security?
2022-08-16 03:00

49% of respondents to a recent Twitter poll carried out by Osirium Technologies describe endpoint management security within their organization as non-existent. Endpoint management allows IT teams to identify, monitor and control end-users' access to corporate networks and systems.

Considerations for Evaluating Endpoint Detection and Response (EDR) Solutions – Infographic
2022-07-25 00:00

Endpoint security solutions range from signature-based endpoint protection platform or antivirus solutions to extended detection and response platforms that tie multiple security solutions together. Organizations that are evaluating endpoint detection and response solutions need to ensure that the products they are considering will meet their needs in the following areas.

Top Nine Criteria When Selecting An Endpoint Detection and Response (EDR) Solution
2022-07-25 00:00

Endpoint security solutions range from the original antivirus solutions of yesteryear to extended detection and response platforms that tie multiple security solutions together for a better ecosystem. As the needs arise for endpoint security solutions, vendors will attempt to make their solutions match buyer expectations and analyst terms through their messaging but not their engineering.

Businesses are adding more endpoints, but can’t manage them all
2022-07-14 03:30

Despite $4,252,500 of annual budget spent on endpoint protection, an average of 48 percent of devices - or 64,800 per enterprise - are at risk because they are no longer detected by the organization's IT department or the endpoints' operating systems have become outdated. 63 percent of respondents find that the lack of visibility into their endpoints is the most significant barrier to achieving a strong security posture.