Tag: endpoint security
Breaking News
Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024
COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...
Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024
COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...
In Appreciation: ESET Founder Rudolf Hruby Passes Away
Rudolf Hruby, a founder and co-owner of Slovakian endpoint security vendor ESET, has died at the age of 69 of unknown causes.ESET was founded...
Critical ‘LogoFAIL’ Bugs Offer Secure Boot Bypass for Millions of PCs
Researchers have uncovered "LogoFAIL," a set of critical vulnerabilities present in the Unified Extensible Firmware Interface (UEFI) ecosystem for PCs.Exploitation of the vulnerabilities nullify...
Critical ‘LogoFAIL’ Bugs Offer Secure Boot Bypass for Millions of PCs
Researchers have uncovered "LogoFAIL," a set of critical vulnerabilities present in the Unified Extensible Firmware Interface (UEFI) ecosystem for PCs.Exploitation of the vulnerabilities nullify...
Generative AI Takes on SIEM
With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While...
MAS Public Cloud Guidelines: A Deep Dive into its Impact on Cloud Security – Fintech Singapore
Amidst a rapidly digitalising world, accelerated further by the COVID-19 pandemic, cloud technology has become a pivotal cornerstone for businesses worldwide. Recently, the Monetary...
Malwarebytes Launches ThreatDown to Empower Resource Constrained IT Organizations
PRESS RELEASE Santa Clara, Calif. and IT Nation Conference, Orlando, Florida – November 7, 2023 – Malwarebytes, a global leader in real-time cyber protection,...
Doing It Together: Detection and Incident Response with Your Cloud Provider
The dynamic and ephemeral nature of the cloud can make detecting and responding to cybersecurity incidents challenging, even for professionals with extensive security expertise...
Malware ‘Meal Kits’ Serve Up No-Fuss RAT Attacks
A rise in the availability of malware "meal kits" for less than $100 is fueling a surge in campaigns using remote access Trojans (RATs),...
Use AWS PrivateLink to set up private access to Amazon Bedrock | Amazon Web Services
Amazon Bedrock is a fully managed service provided by AWS that offers developers access to foundation models (FMs) and the tools to customize them...
Cybersecurity at the Crossroads – Can it Keep Up with Threats?
The need of
cybersecurity has become increasingly clear in a society dominated by digital
communications. As technology advances, it creates new opportunities for
creativity while also posing...