Topic: endpoint security

  • #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    Endpoint security is crucial as cyber threats target corporate devices, IoT, and supply chains, with gaps in protection leaving enterprises vulnerable. Identity breaches and compromised credentials are major attack vectors, exacerbated by poor patch management and BYOD policies. Modern EDR tools ...

    Read More »
  • Absolute Security Enhances Platform with AI Assistant & Real-Time Risk Tools

    Absolute Security Enhances Platform with AI Assistant & Real-Time Risk Tools

    Absolute Security has upgraded its Absolute Resilience Platform with an AI-powered assistant and real-time risk management tools, enabling natural-language interactions for faster security assessments and compliance checks. The platform now includes advanced application control and customizable d...

    Read More »
  • Secure Your Web Edge: Stop Browser-Based Breaches Now

    Secure Your Web Edge: Stop Browser-Based Breaches Now

    Modern web browsers are central to enterprise operations but also a major security vulnerability, increasingly targeted by cybercriminals for identity intrusions and data theft. A webinar on September 29th will explore how browsers are weaponized, covering attack methods like session hijacking an...

    Read More »
  • Akira Ransomware Hijacks Victim's Remote Management Tool

    Akira Ransomware Hijacks Victim's Remote Management Tool

    Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...

    Read More »
  • 3 Must-Haves to Survive a Cyberattack

    3 Must-Haves to Survive a Cyberattack

    Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...

    Read More »
  • Gen AI Attacks Drive 40% of Cybersecurity Budgets to Software

    Gen AI Attacks Drive 40% of Cybersecurity Budgets to Software

    Organizations are shifting cybersecurity budgets toward software, which now accounts for 40% of spending, to counter AI-powered threats that operate faster than human response capabilities. Generative AI is enabling threats like personalized phishing at scale, deepfakes bypassing biometric securi...

    Read More »
  • Global Data Breach Risk Soars from Indian Suppliers

    Global Data Breach Risk Soars from Indian Suppliers

    Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...

    Read More »
  • MacOS Users Targeted by Atomic Stealer Malware on GitHub

    MacOS Users Targeted by Atomic Stealer Malware on GitHub

    A new campaign spreads Atomic Stealer malware by creating fake GitHub repositories that appear to offer legitimate Mac software downloads, tricking users through search engine optimization. The malware is installed via a social engineering trick where users manually run a malicious Terminal comma...

    Read More »