Advertisement
Top

Tag: endpoint security


Application security, Security, Threats & Malware, Vulnerabilities

Snapdragon Chip Flaws Could Facilitate Mass Android Spying

August 11, 2020

Via: DataBreach Today

Heads-up on the existence of a serious security problem affecting many Android devices for which no fix is yet available, short of ditching any vulnerable gear. Researchers at Check Point Software Technologies have counted 400 flaws in Qualcomm’s Digital Signal […]


Network security, Security

Microsoft May Be TikTok’s Privacy and Security Lifeline

August 3, 2020

Via: DataBreach Today

Is Microsoft coming to TikTok’s rescue? It appears that’s a very strong possibility following President Donald Trump’s threat Friday to ban the app in the U.S. In a statement late Sunday, Microsoft says it’s discussing acquiring a portion of TikTok. […]


Threats & Malware, Vulnerabilities

Companies Respond to ‘BootHole’ Vulnerability

July 30, 2020

Via: Security Week

Firmware security company Eclypsium revealed on Wednesday that billions of Windows and Linux devices are affected by a potentially serious vulnerability that can be exploited to install stealthy and persistent malware. The firm says the weakness affects devices that use […]


Threats & Malware, Vulnerabilities

The Hacker Battle for Home Routers

July 27, 2020

Via: DataBreach Today

Three botnet families are battling it out, seeking vulnerable home routers to take over and use as proxies, researchers at the security firm Trend Micro say. Residential routers are a prime target for cybercriminals. Most households have one, and due […]


Hacker, Threats & Malware

Twitter Hijackers Used Well-Honed Fraudster Playbook

July 20, 2020

Via: DataBreach Today

The hijacking of more than 130 high-profile Twitter accounts last week is extraordinary in at least one respect: that it didn’t happen sooner. As online companies have improved their security protections to prevent account hijacking, attackers have looked for new […]


Cyber warfare, Cyber-crime

COVID-19 Adds to US Election Security Challenges: Report

June 8, 2020

Via: DataBreach Today

The global COVID-19 pandemic has created a new series of cybersecurity challenges for election officials across the U.S., including concerns about the security of mail-in ballots and whether attackers will target vulnerable networks for those local election workers still working […]


Threats & Malware, Vulnerabilities

Thunderspy: More Thunderbolt Flaws Expose Millions of Computers to Attacks

May 11, 2020

Via: Security Week

The new attack method, dubbed Thunderspy, was discovered by Björn Ruytenberg of the Eindhoven University of Technology in the Netherlands. The researcher has discovered a total of 7 vulnerabilities related to improper firmware verification, weak device authentication, the use of […]


Network security, Security

Is enterprise security broken?

April 21, 2020

Via: CSO Online

The average enterprise, according to many estimates, has between 200-500 individual security products installed, ranging from multiple products deployed on user endpoint devices, all the way up to large scale network monitoring and protection software/appliances, as well as cloud-based service […]


Cloud security, Security

Uncertain Markets May Drive Cybersecurity Consolidation

March 17, 2020

Via: DataBreach Today

After a week of ups and downs, Wall Street took another plunge on Monday, bringing technology companies and cybersecurity firms along for the ride for what turned out to be one of the worst U.S. stock market days in history. […]


Cloud security, Network security, Security

Cybersecurity Sector Faces Reckoning After Coronavirus Hits

March 10, 2020

Via: DataBreach Today

Monday is a day that Wall Street – and cybersecurity firms – are not likely to forget anytime soon. With the twin threats of COVID-19 spreading throughout the world and oil prices plummeting nearly 34 percent due to a dispute […]


Cyber-crime, Phishing

Corporate cybersecurity concerns and spend continue to rise, but so do breaches

March 6, 2020

Via: Help Net Security

More than 50 percent of security and IT leaders agree that they are very concerned about the security of corporate endpoints given the prevalence of sophisticated attack vectors like ransomware, disruptionware, phishing and more, according to a survey from RSA […]


Threats & Malware, Vulnerabilities

80% of successful breaches are from zero-day exploits

January 31, 2020

Via: Help Net Security

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or […]


Mobile, Privacy protection

Avast Stops Using Security Software to Track Browsing Data

January 31, 2020

Via: DataBreach Today

Facing intense criticism, anti-virus software maker Avast on Thursday said it will shut down Jumpshot, its data collecting side business. The Avast subsidiary has been funneling to marketers detailed internet browsing activity from the firm’s security products and browser extensions. […]


Threats & Malware, Vulnerabilities

Devices Still Vulnerable to DMA Attacks Despite Protections

January 30, 2020

Via: Security Week

DMA is designed to allow hardware components or peripheral devices to directly access system memory, independently of the operating system and the CPU. The feature, however, can be abused for malicious purposes by an attacker who has gained access to […]


Hacker, Threats & Malware

Cyber criminals spend three months lurking in target networks

January 14, 2020

Via: Computer Weekly

Hackers spent an average of 95 days moving around inside business networks before launching their attacks in 2019, up 10 days on 2018, as increasingly organised criminal groups become adept at hiding their activities from defenders in targeted attacks. This […]


Network security

Simplicity Is the Key to Progress in Endpoint Security

February 26, 2018

Via: Security Intelligence

There has been a critical skills shortage in cybersecurity for years. In fact, Cisco estimated that there are currently 1 million unfilled cybersecurity positions around the world. Given the rapid expansion of networks, the growing threat surface, continuous attacker innovation […]


Access control, Cyber-crime, Network security

Let no endpoint go dark

December 18, 2017

Via: Help Net Security

The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost reputation. Most organizations know this, but still struggle to obtain visibility into and control over […]


Network security

Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts

November 8, 2017

Via: Security Intelligence

When it comes to securing their environments, IT professionals have a critical decision to make: Should they wait until after malicious actors strike to react to security incidents, or should they address threats proactively to stop attacks before they happen? […]


Network security, Security

Infosec weakest links: Negligent employees and poor password policies

September 19, 2017

Via: Help Net Security

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. The study found that strong passwords and biometrics continue to be an essential part […]


Cloud security

Best Practices for Developing and Securing a Microservices Architecture

August 15, 2017

Via: Security Intelligence

To match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices […]