Endpoint Security

What's It Like to Hunt Threats With a Modern NDR?
Endpoint & Device Security What's It Like to Hunt Threats With a Modern NDR?

Stepping into the high-stakes world of a modern Security Operations Center (SOC) reveals a complex battleground where analysts race against time to decipher cryptic clues left by sophisticated adversaries. This exploration delves deep into the daily workflow of these digital defenders by

Is North Korea Using AI to Target Blockchain Developers?
Endpoint & Device Security Is North Korea Using AI to Target Blockchain Developers?

A sophisticated and ongoing phishing campaign has revealed a startling evolution in the cyber threat landscape, where the North Korean advanced persistent threat (APT) group known as Konni is now strategically targeting blockchain developers with malware that appears to be generated with artificial

Zscaler Acquires SquareX Amid Secure Browser Boom
Endpoint & Device Security Zscaler Acquires SquareX Amid Secure Browser Boom

The vast majority of corporate data and applications now flow through a single, ubiquitous portal that was never originally designed to be a fortress, creating a new and highly attractive attack surface for cybercriminals. In response, a seismic shift is underway in the cybersecurity industry, with

Google Reveals Coordinated Cyber Siege on Defense Sector
Endpoint & Device Security Google Reveals Coordinated Cyber Siege on Defense Sector

A newly released analysis from Google's Threat Intelligence Group has meticulously detailed a sustained and highly coordinated multi-vector cyber offensive waged against the global defense industrial base, revealing a complex web of state-sponsored espionage and disruption. The comprehensive report

When Is a Windows Flaw Not a Vulnerability?
Data Protection & Privacy When Is a Windows Flaw Not a Vulnerability?

Today we’re speaking with Rupert Marais, our in-house security specialist, about a series of newly disclosed techniques that turn the humble Windows shortcut, or LNK file, into a surprisingly potent tool for cyberattacks. We'll be exploring the technical nuances of how these shortcuts can be

North Korean Hackers Weaponize VS Code Tunnels
Endpoint & Device Security North Korean Hackers Weaponize VS Code Tunnels

A developer's most trusted toolset can become an adversary's most effective weapon, turning a secure environment for remote collaboration into a hidden backdoor for state-sponsored espionage. This new reality is underscored by a sophisticated campaign where North Korean threat actors have co-opted

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later