Generative Data Intelligence

Tag: endpoint security

Winter Vivern APT Blasts Webmail Zero-Day Bug With One-Click Exploit

Low-profile threat group Winter Vivern has been exploiting a zero-day flaw in Roundcube Webmail servers with a malicious email campaign targeting governmental organizations and...

North Korea’s Kimsuky Doubles Down on Remote Desktop Control

North Korea's Kimsuky advanced persistent threat (APT) continues to evolve its attack methods and grow in sophistication, expanding its ability to control victims' systems...

BlackBerry Unveils Next-Generation UEM Redefining the Endpoint Management Market

PRESS RELEASEWATERLOO, ON, Oct. 10,2023 / PRNewswire/-- BlackBerry Limited (NYSE: BB; TSX: BB), the pioneer of enterprise mobility management, today announced two major new Unified Endpoint...

WatchGuard Threat Lab Report Finds Endpoint Malware Volumes Decreasing Despite Campaigns Growing More Expansive

PRESS RELEASESEATTLE – Oct. 4, 2023 – WatchGuard® Technologies, a global leader in unified cybersecurity, today announced the findings of its latest Internet Security Report, detailing...

Quash EDR/XDR Exploits With These Countermeasures

In early 2023, a user named "spyboy" promoted a tool for evading endpoint defense on the Windows operating system through the Russian-language forum Ramp....

Nokia Selected by Brazil’s K2 Telecom As Partner to Strengthen Its Security and Create Revenue Streams

PRESS RELEASE04 October 2023 — São Paulo, Brazil – Nokia today announced that it has been selected with partner DPR by K2 Telecom Brazil...

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring...

Recast Software Acquires Liquit, Consolidating the Endpoint and Application Management Markets

Minneapolis, MN (September 21, 2023) â€” Recast Software, a leader in endpoint management, has acquired Liquit, a leader in application management. With the acquisition, Recast Software...

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET researchers have analyzed two campaigns by the OilRig APT group: Outer Space (2021), and Juicy Mix (2022). Both of these cyberespionage campaigns targeted...

FBI, CISA Issue Joint Warning on ‘Snatch’ Ransomware-as-a-Service

Cybersecurity advisories from the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) are usually a good indication that a particular threat merits...

Why Identity Management Is the Key to Stopping APT Cyberattacks

Dark Reading News Desk interviewed Adam Meyers, head of counter adversary operations for CrowdStrike at Black Hat USA 2023. Check out the News Desk...

Weaponized Windows Installers Target Graphic Designers in Crypto Heist

Attackers are targeting 3D modelers and graphic designers with malicious versions of a legitimate Windows installer tool in a cryptocurrency-mining campaign that's been ongoing...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?