HackDig : Dig high-quality web security articles

Ransomware protection with Malwarebytes EDR: Your FAQs, answered!

We get a few questions about ransomware protection and how our Endpoint Detection and Response software can protect you from ransomware. In this post, our security experts answer some of your most frequently asked questions about ransomware and how our EDR can help—let’s get started. Q: When considering an EDR solution, what anti-ransomware features shoul
Publish At:2022-08-04 11:53 | Read:159 | Comments:0 | Tags:Business Anti-Ransomware detection EDR flight recorder Nebul

The winding road to compliance

“Here are the keys. Buy milk and bread. Drive safely.” These are important instructions for a new driver tasked with running an errand. But unless the driver knows where they are going, a bit of guidance on how to get to the store can only help. Without it, the driver may complete the errand successfully, or at least make a good effort; but they might
Publish At:2022-07-21 16:02 | Read:142 | Comments:0 | Tags:Business compliance dns filtering EDR governance vpm

Are your visuals making businesses more vulnerable to cybercrime?

In the world of modern business, companies must put extra effort into creating engaging visual content to stand out from the crowd. Social media marketing, for instance, was once deemed an easy way for companies to reach additional eyes but today, marketing is a lot more competitive than simply creating a post and hoping it goes viral.Entertaining short-form
Publish At:2022-07-19 01:06 | Read:330 | Comments:0 | Tags:Featured Articles IT Security and Data Protection business c

Endpoint security for Mac: 3 best practices

If you’re one of the 50% of small and medium-sized businesses (SMBs) that use Mac devices today, chances are your IT and security teams have a ton of Mac endpoints to monitor.  Securing that many endpoints can get really complex, really fast, especially when you consider that the common wisdom that Macs don’t get malware simply isn’t true: in fact, t
Publish At:2022-07-14 11:52 | Read:366 | Comments:0 | Tags:Business adware Apple dns filtering endpoint detection and r

Ransomware rolled through business defenses in Q2 2022

Ransomware has given security professionals a headache for the better part of a decade. Fast forward to 2022, and the headache has become a migraine—not just for IT teams but business owners, employees, and customers as well. Over the last three months, ransomware gangs have increased the pressure by multiplying in number and unleashing targeted attacks on v
Publish At:2022-07-13 20:00 | Read:421 | Comments:0 | Tags:Business black basta conti government lockbit ransomware

Microsoft appears to be rolling back Office Macro blocking

We’re seeing several reports indicating that Microsoft may have rolled back its decision to block Macros in Office. Currently no official statement exists—the reports rely on a post by a Microsoft employee in the replies of the original article where the plan to block macros was announced. Earlier this year, Microsoft decided to disable macros down
Publish At:2022-07-11 07:54 | Read:372 | Comments:0 | Tags:Business excel macros mark of the web microsoft Office VBA m

4 ways businesses can save money on cyber insurance

So, your business has just suffered a data breach and it’s time to dig deep in your pockets to pay all the resulting expenses. Without cyber insurance, you can expect to pay a dizzying amount of cash. In 2022 alone, the average cost of a data breach for businesses under 1,000 employees was close to $3 million—and these costs are coming from activities tha
Publish At:2022-07-10 20:00 | Read:440 | Comments:0 | Tags:Business business cyber attack cyber insurance data breach E

Cloud-based malware is on the rise. How can you secure your business?

There’s a lot of reasons to think the cloud is more secure than on-prem servers, from better data durability to more consistent patch management — but even so, there are many threats to cloud security businesses should address. Cloud-based malware is one of them. Indeed, while cloud environments are generally more resilient to cyberthreats than on-prem in
Publish At:2022-07-05 16:02 | Read:323 | Comments:0 | Tags:Business backups cloud security cloud storage EDR malware ma

Security vulnerabilities: 5 times that organizations got hacked

Businesses and governments these days are relying on dozens of different Software-as-a-Service (SaaS) applications to run their operations — and it’s no secret that hackers are always looking for security vulnerabilities in them to exploit. According to research by BetterCloud, the average company with 500 to 999 employees uses about 93 different SaaS app
Publish At:2022-06-21 09:02 | Read:622 | Comments:0 | Tags:Business exploits government hack patch management ransomwar

LinkedIn scams are a “significant threat”, warns FBI

Digital currency fraud is a growing issue on social media, and LinkedIn is no different. In fact, according to according to Sean Ragan, the FBI’s special agent in charge of the San Francisco and Sacramento, California, field offices, cryptocurrency scams are big business on LinkedIn. “It’s a significant threat. This type of fraudulent activity is si
Publish At:2022-06-20 13:00 | Read:652 | Comments:0 | Tags:Scams business cryptocurrency fraud LinkedIn pig butcher sca

Cloud data breaches: 4 biggest threats to cloud storage security

Just about anywhere you look, organizations are using the cloud in some form—and they’re not all large enterprises. Small and medium businesses (SMBs) are also reaping the many benefits that the cloud offers over on-premise software, especially the lowered IT costs, increased scalability, and large storage capacity that come along with it. No doubt, with
Publish At:2022-06-09 16:57 | Read:1161 | Comments:0 | Tags:Business cloud security cloud storage data breach privacy ra

5 Linux malware families SMBs should protect themselves against

There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros to choose from, it’s (generally) free, and perhaps above all — it’s secure. The common wisdom goes that Linux malware is rare, and for the most part this is true. Thanks to its built-in security defenses, strict user privilege model, and transparen
Publish At:2022-06-08 13:00 | Read:523 | Comments:0 | Tags:Business botnet Linux malware ransomware rootkit SMB

Microsoft Autopatch is here…but can you use it?

Updating endpoints on a network can be a daunting task. Testing before rollout can take time. Delays to patches going live can cause all manner of headaches. Windows Autopatch aims to tackle some of these issues, and is now live for public preview. The release comes with a few caveats which you’ll want to keep in mind. Fixing a patchy experience
Publish At:2022-06-06 21:07 | Read:1057 | Comments:0 | Tags:Business microsoft rings testing updates windows autopatch

Introducing Malwarebytes DNS Filtering module: How to block sites and create policy rules

We’re happy to announce Malwarebytes DNS Filtering, a new module for the Nebula platform which helps block access to malicious websites and limit threats introduced by suspicious content. But how exactly does it work, you ask? In this post, we give a basic walkthrough of the module, starting off with how to create DNS filtering rules. We’ll then show
Publish At:2022-06-02 16:57 | Read:981 | Comments:0 | Tags:Business dns dns filter dns filtering Malwarebytes DNS filte

Introducing EDR for Linux: Remediating and isolating threats on Linux servers

We’re excited to announce our new EDR for Linux offering, which extends our advanced protection and response capabilities to Linux devices via Nebula and OneView. In this post, we show you what remediating and isolating threats on Linux servers looks like with Malwarebytes EDR for Linux. Let’s get started! Table of Contents Part 1: Downloading
Publish At:2022-06-02 16:57 | Read:538 | Comments:0 | Tags:Business EDR for Linux endpoint detection and response linux


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud