endpoint security

Business

Beware Fake PayPal Alerts: Hackers Steal Logins, Deploy Malware

A sophisticated cyberattack uses fake PayPal security alerts, starting with phishing emails and escalating through phone-based social engineering to install…

Read More »
Business

20% of Data Breaches Require Two Weeks to Recover

A major data breach can cripple business operations for up to two weeks and cost millions of dollars, highlighting the…

Read More »
Business

DeadLock Ransomware Evades Security with BYOVD Attack

The DeadLock ransomware campaign uses a BYOVD technique, exploiting a known vulnerability (CVE-2024-51324) in a Baidu Antivirus driver to disable…

Read More »
Business

Morphisec’s Enhanced Anti-Ransomware Blocks Evasive Attacks

Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced…

Read More »
Artificial Intelligence

Employees Are Outsmarting Company Security Controls

Rapid adoption of AI, SaaS, and personal devices is reshaping work, but traditional security measures like SSO and IAM are…

Read More »
Business

Nozomi Networks’ Arc Release Boosts OT Security

Nozomi Networks has upgraded its Arc platform to include automated threat prevention for operational technology, enabling active defense of critical…

Read More »
Business

Nozomi Networks Automates Critical Infrastructure Cybersecurity

Nozomi Networks has launched automated threat prevention in its Nozomi Arc platform, providing the industry's first safe, automated response solution…

Read More »
Business

Zero-Day Attack Exploits Lanscope Endpoint Manager Flaw

A critical zero-day vulnerability (CVE-2025-61932) in Lanscope Endpoint Manager is being actively exploited, primarily targeting Japanese customers since April 2025.…

Read More »
Business

Absolute Security Rehydrate: Restore Compromised Endpoints Fast

Absolute Security's Rehydrate enables businesses to remotely restore compromised endpoints at scale, often in under 30 minutes, reducing downtime and…

Read More »
Business

Unmasking the .54lg9 File Extension: Mimic/Pay2Key Threat Explained

A server migration failure due to neglected backup protocols allowed ransomware to enter through an unprotected workstation, encrypting files with…

Read More »
Artificial Intelligence

Absolute Security Enhances Platform with AI Assistant & Real-Time Risk Tools

Absolute Security has upgraded its Absolute Resilience Platform with an AI-powered assistant and real-time risk management tools, enabling natural-language interactions…

Read More »
Cybersecurity

Active Exploits Target Trend Micro Apex One Flaws (CVE-2025-54948, CVE-2025-54987)

Security teams are alert as attackers exploit unpatched vulnerabilities (CVE-2025-54948 and CVE-2025-54987) in Trend Micro's Apex One, risking remote code…

Read More »
Business

#Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

Endpoint security is crucial as cyber threats target corporate devices, IoT, and supply chains, with gaps in protection leaving enterprises…

Read More »