Generative Data Intelligence

Tag: XDR

‘Scarred Manticore’ Unleashes the Most Advanced Iranian Cyber Espionage Yet

An Iranian state-sponsored threat actor has been spying on high-value organizations across the Middle East for at least a year, using a stealthy, customizable...

Trellix XDR Platform Wins Coveted 2023 Top InfoSec Innovator Award

Trellix wins ‘Editor’s Choice in XDR’ in Cyber Defense Magazine’s Annual InfoSec Awards during CyberDefenseCon 2023 SAN JOSE, Calif.–(BUSINESS WIRE)–Trellix, the cybersecurity company delivering the...

Appdome Announces Attack Evaluation Tools in Digital Economy’s Mobile XDR

PRESS RELEASEREDWOOD CITY, Calif., October 11, 2023 – Appdome, the mobile one-stop shop for mobile app defense, today released new threat evaluation tools inside ThreatScopeâ„¢ Mobile...

Quash EDR/XDR Exploits With These Countermeasures

In early 2023, a user named "spyboy" promoted a tool for evading endpoint defense on the Windows operating system through the Russian-language forum Ramp....

Trend Micro Drives Latest Phase of Channel Prosperity and Engagement

PRESS RELEASEDALLAS, Oct. 4, 2023 /PRNewswire/ -- Global cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) has announced a complete redesign to the company's worldwide partner program. This...

Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks

Basic security hygiene is more impactful than you may realize. While industry headlines are often dominated by emerging tech and the latest software or...

Latest Acquisition Powers AI-based Network Detection and Response and Open XDR Capabilities for WatchGuard

SEATTLE – September 20, 2023 â€“ WatchGuard® Technologies, a global leader in unified cybersecurity, today announced the acquisition of CyGlass Technology Services, a leading provider of cloud and network-centric...

Cisco Moves into SIEM with $28B Deal to Acquire Splunk

Cisco signaled it intends to reshape secure information and event management (SIEM) by pulling the trigger on a deal to acquire Splunk for $28...

‘ShroudedSnooper’ Backdoors Use Ultra-Stealth in Mideast Telecom Attacks

A potentially novel threat actor recently compromised two Middle East-based telecommunications organizations, using two backdoors with previously unseen methods for stealthily loading malicious shellcode...

3 Strategies to Defend Against Resurging Infostealers

Most enterprise chief information security officers (CISOs) are very familiar with infostealers, a pervasive breed of malware that quietly gathers website credentials, passwords, and...

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

DALLAS, Aug. 29, 2023 /PRNewswire-PRWeb/ -- Everest Group is calling on enterprises to make the critical shift in focus from cybersecurity to cyber resilience. While cybersecurity...

Cisco: Bringing More Intelligence to Bear on the Threat Landscape

Cisco’s Nick Biasini describes how attackers’ tactics, techniques, and procedures continue to increase in sophistication, and what organizations can do to be better prepared...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?