Topic: attack surface reduction

  • Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender has launched GravityZone PHASR as a standalone solution, enabling businesses to add advanced pre-emptive protection to their existing security systems without replacing them. PHASR merges behavior-based security hardening with live threat intelligence to proactively block ransomware a...

    Read More »
  • Silent After a Hack? Why Firms' Silence Puts You at Risk

    Silent After a Hack? Why Firms' Silence Puts You at Risk

    Cyber threats are shifting toward stolen credentials and built-in system tools, requiring proactive security measures as traditional perimeter defenses become ineffective. Organizations are prioritizing attack surface reduction by eliminating unnecessary tools and permissions, while hackers incre...

    Read More »
  • Your Own Tools Are Being Weaponized: Here's How to Fight Back

    Your Own Tools Are Being Weaponized: Here's How to Fight Back

    SMEs often neglect cybersecurity, creating vulnerabilities as new threats specifically target the everyday tools businesses rely on, bypassing traditional security measures. A major emerging threat is "living-off-the-land" (LOTL) attacks, where hackers misuse trusted system utilities like PowerSh...

    Read More »
  • Sprout: The Fast, Secure Open-Source Bootloader

    Sprout: The Fast, Secure Open-Source Bootloader

    Sprout is an open-source bootloader that achieves sub-second boot times, launching a Linux system in under 50 milliseconds, ideal for cloud computing and rapid deployments. Built entirely in Rust, Sprout enhances security by avoiding memory-related vulnerabilities, establishing a memory-safe chai...

    Read More »
  • RadiantOne Adds Composable Remediation and Unified Identity Observability

    RadiantOne Adds Composable Remediation and Unified Identity Observability

    The RadiantOne Platform introduces AI-powered collaborative remediation and a unified observability layer, shifting identity management from reactive monitoring to proactive, continuous posture control to strengthen Zero Trust architectures. A core innovation is an AI Data Assistant (AIDA) that f...

    Read More »
  • Secure Active Directory with UserLock IAM: Product Showcase

    Secure Active Directory with UserLock IAM: Product Showcase

    UserLock is a modern IAM layer for Microsoft Active Directory that enhances security with granular MFA, contextual access rules, and real-time session monitoring without requiring a disruptive identity overhaul. It provides comprehensive visibility and control by aggregating AD entities into dash...

    Read More »
  • Docker Hardened Images: Now Affordable for Small Businesses

    Docker Hardened Images: Now Affordable for Small Businesses

    Docker now offers unlimited access to its Hardened Images catalog through an affordable subscription, making secure, vulnerability-checked container images accessible to startups and small businesses with a 30-day free trial. These images are built from source code, stripped of non-essential comp...

    Read More »
  • SolarWinds Help Desk Flaw Under Active Attack

    SolarWinds Help Desk Flaw Under Active Attack

    A critical vulnerability (CVE-2025-40551) in SolarWinds Web Help Desk is under active attack, allowing unauthenticated attackers to execute remote code and gain administrative control, prompting urgent patching orders from US authorities. The flaw is one of four critical vulnerabilities, all with...

    Read More »