Pioneering Automated Moving Target Defense (AMTD)
As the cyber threat landscape becomes ever more challenging, security teams find themselves dealing with a rapidly growing number of...
As the cyber threat landscape becomes ever more challenging, security teams find themselves dealing with a rapidly growing number of...
ManageEngine has announced the addition of the next-generation antivirus (NGAV) capability in its unified endpoint management (UEM) solution, Endpoint Central,...
Published in: ...
Oct 14, 2023NewsroomAuthentication / Endpoint Security Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows...
Oct 11, 2023NewsroomVulnerability / Endpoint Security Microsoft has released its Patch Tuesday updates for October 2023, addressing a total of...
Published in: ...
Rapid7 has revealed that its Managed Detection and Response (MDR) service now includes multi-layered endpoint prevention and forensics capabilities powered...
Sep 27, 2023THNVulnerability / Endpoint Security A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU)...
Sep 07, 2023THNMalvertising / Endpoint Security A new malvertising campaign has been observed distributing an updated version of a macOS...
Aug 30, 2023THNMalware / Endpoint Security New findings show that malicious actors could leverage a sneaky malware detection evasion technique...
Aug 22, 2023THNMalware / Endpoint Security A new variant of an Apple macOS malware called XLoader has surfaced in the...
Aug 07, 2023THNDeep Learning / Endpoint Security A group of academics has devised a "deep learning-based acoustic side-channel attack" that...
Researchers discovered a bypass for a recently fixed actively exploited vulnerability in Ivanti Endpoint Manager Mobile (EPMM). Rapid7 cybersecurity researchers...
Ivanti, which last week had to move on a vulnerability in its Endpoint Manager Mobile (EMM) product, has disclosed a...
US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog....