Topic: ransomware protection

  • Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced EDR Tamper Protection, to proactively address critical security gaps. The Network Share Protection blocks ransomware encryption at...

    Read More »
  • Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender has launched GravityZone PHASR as a standalone solution, enabling businesses to add advanced pre-emptive protection to their existing security systems without replacing them. PHASR merges behavior-based security hardening with live threat intelligence to proactively block ransomware a...

    Read More »
  • Ootbi Mini: Zero Trust, Unbreakable Data Security

    Ootbi Mini: Zero Trust, Unbreakable Data Security

    Object First launched the Ootbi Mini, a compact, immutable storage appliance designed to protect Veeam backup data from ransomware, targeting remote offices and small businesses with capacities up to 24TB. The device is built on a zero trust architecture, ensuring complete data immutability and r...

    Read More »
  • Wasabi's Covert Copy Boosts Cloud Storage Security

    Wasabi's Covert Copy Boosts Cloud Storage Security

    Wasabi's new Covert Copy feature creates a hidden, locked backup of cloud storage that is invisible and inaccessible to attackers, enhancing ransomware defense. It requires multi-user authentication to access the protected data and is designed for simple, cost-effective implementation with no egr...

    Read More »
  • Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian

    Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian

    Cayosoft Guardian Protector offers free, real-time threat detection and monitoring for Microsoft hybrid identity environments, including Active Directory and Entra ID, to defend against ransomware and insider threats without licensing costs. It provides comprehensive visibility and immediate aler...

    Read More »
  • Veeam Unveils New Data Resilience Innovations at GITEX 2025

    Veeam Unveils New Data Resilience Innovations at GITEX 2025

    Veeam Software will showcase its expanded data resilience solutions at GITEX GLOBAL 2025, including the Veeam Data Platform, Veeam Data Cloud, and the new Data Resilience Maturity Model to help organizations combat cyber threats. The company will feature live demonstrations and announcements such...

    Read More »
  • Uncover Hidden DevOps Data Risks and How to Fix Them

    Uncover Hidden DevOps Data Risks and How to Fix Them

    DevOps practices accelerate innovation but introduce significant data vulnerabilities, with Git platforms often holding mission-critical information that faces risks of exposure, loss, or corruption. The Shared Responsibility Model in cloud services places security duties on customers to enforce ...

    Read More »
  • Acronis Adds Patch Management to Backup Software

    Acronis Adds Patch Management to Backup Software

    Acronis True Image 2026 integrates backup, security, and patch management into a single application, featuring automated Windows patching and AI-driven threat detection for enhanced cyber protection. The platform offers advanced cybersecurity features like anti-ransomware capabilities and protect...

    Read More »
  • 3 Must-Haves to Survive a Cyberattack

    3 Must-Haves to Survive a Cyberattack

    Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...

    Read More »
  • Box Shield Pro: Secure AI Workflows & Protect Sensitive Data

    Box Shield Pro: Secure AI Workflows & Protect Sensitive Data

    Box has launched Box Shield Pro, an AI-enhanced security suite that builds on its existing platform to better protect enterprise data and improve threat response against risks like ransomware and accidental exposure. The new solution includes AI-driven agents for automated content classification,...

    Read More »
  • Top Cybersecurity Products Launched This Week: October 2025

    Top Cybersecurity Products Launched This Week: October 2025

    OPSWAT's MetaDefender Drive offers a portable, network-free threat scanner for securely validating temporary devices before they access protected networks. Radiflow360 integrates operational technology risk management, compliance, and incident response into a unified platform for mid-sized indust...

    Read More »
  • Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships

    Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships

    Pure Storage is enhancing cybersecurity by embedding native threat detection into its storage platform and forming strategic partnerships to proactively identify threats and enable faster recovery. The company is integrating with security leaders like CrowdStrike and Superna to provide real-time ...

    Read More »
  • Illumio and Microsoft Partner to Stop Cyber Breaches at Scale

    Illumio and Microsoft Partner to Stop Cyber Breaches at Scale

    Microsoft has fully implemented Illumio's Insights and Segmentation platform across its entire corporate IT infrastructure, marking a strategic shift toward proactive, AI-driven cybersecurity to prevent threats from spreading. The partnership was driven by Illumio's ability to meet Microsoft's im...

    Read More »
  • Tycoon 2FA Phishing Platform Exposes Legacy MFA Flaws

    Tycoon 2FA Phishing Platform Exposes Legacy MFA Flaws

    The Tycoon 2FA phishing kit enables attackers to easily bypass multi-factor authentication by using automated tools and fake login portals, primarily targeting Microsoft 365 and Gmail credentials. It intercepts user credentials and session cookies in real-time while mimicking legitimate login exp...

    Read More »
  • NAKIVO v11.1: Enhanced Disaster Recovery & MSP Tools

    NAKIVO v11.1: Enhanced Disaster Recovery & MSP Tools

    NAKIVO Backup & Replication v11.1 enhances data protection with new disaster recovery tools and improved management features for MSPs, supporting virtual, physical, cloud, and SaaS infrastructures. The update introduces multilingual support in five languages, real-time replication for VMware, and...

    Read More »
  • Top 10 Data Security Companies to Watch in 2026

    Top 10 Data Security Companies to Watch in 2026

    Atakama provides a browser security platform for managed service providers, enabling data policy enforcement and threat monitoring through browser extensions and dashboards. AvePoint offers a Data Security Posture Management solution that identifies, classifies, and protects sensitive cloud data ...

    Read More »
  • SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne has been named a Leader in the IDC MarketScape for XDR software in 2025, highlighting its AI-native cybersecurity platform, Singularity, which unifies security data and analytics to combat threats effectively. The platform integrates endpoint, cloud, identity, and generative AI securi...

    Read More »
  • Securing Legacy Medical Devices Beyond Patching

    Securing Legacy Medical Devices Beyond Patching

    Legacy medical devices without security patches require protective barriers and close collaboration with vendors to manage risks and plan phased replacements. A risk-based security approach supports compliance by focusing on proactive measures, staff education, and strategic risk mitigation rathe...

    Read More »
  • LNER Supply Chain Attack Exposes Customer Data

    LNER Supply Chain Attack Exposes Customer Data

    A supply chain attack via a third-party supplier exposed LNER customer data, including personal contact details and travel history, but no financial information was accessed. Security experts warn that the stolen data could be used for phishing or identity attacks, advising both organizations and...

    Read More »