HackDig : Dig high-quality web security articles for hacker

Peter Leav Named CEO of McAfee

Cybersecurity firm McAfee announced on Thursday that its board of managers has appointed Peter Leav as the company’s new chief executive officer after Chris Young decided to step down.Leav will take on the role of CEO on February 3 and he will also be appointed to the company’s board of managers. Young will stay on in an advisory role to assist with the tran
Publish At:2020-01-17 10:15 | Read:229 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Management & Strat

NSA Discloses Serious Windows Vulnerability to Microsoft

The U.S. National Security Agency (NSA) has informed Microsoft that Windows is affected by a potentially serious spoofing vulnerability that could allow hackers to make a malicious file appear to come from a trusted source or conduct man-in-the-middle (MitM) attacks.The NSA reached out to reporters to inform them about the vulnerability before Microsoft rele
Publish At:2020-01-14 22:15 | Read:172 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vu

Microsoft Security Essentials Will Not Protect Windows 7 PCs After January 14, 2020

Microsoft Security Essentials (MSE) will stop protecting Windows 7 PCs on January 14, 2020, when support for Windows 7 is set to end.Organizations that cannot update their systems from Windows 7 to Windows 10 until January 14 can continue receiving patches for critical and important vulnerabilities for up to another three years if they purchase Extended Secu
Publish At:2019-12-12 10:15 | Read:371 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Risk Management Manage

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a silent alarm. A handful of the best
Publish At:2019-12-06 16:45 | Read:406 | Comments:0 | Tags:Endpoint Security endpoint EDR

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats may not get the insights unco
Publish At:2019-12-06 16:45 | Read:279 | Comments:0 | Tags:Endpoint Security Endpoint security endpoint mvision EDR sec

Intel Announces Compute Lifecycle Assurance to Protect Platform Supply Chains

Globalization and business transformation have created an incredibly complex worldwide supply chain for almost all manufacturers. Hardware ostensibly manufactured in the U.S. will inevitably include components manufactured in many different locations around the world -- including nations that are in other circumstances described as 'adversary states'.The pot
Publish At:2019-12-04 22:15 | Read:236 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY

Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

Vulnerabilities discovered in Kaspersky Secure Connection, Trend Micro Maximum Security, and Autodesk Desktop Application could be exploited for DLL preloading, code execution, and privilege escalation, a security firm has warned.According to SafeBreach, Kaspersky Secure Connection (KSDE), a VPN client used with various Kaspersky applications, including Secu
Publish At:2019-12-02 22:15 | Read:451 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Vulnerabilities

New Technique Allows Ransomware to Operate Undetected

A recently discovered technique allows ransomware to encrypt files on Windows-based systems without being detected by existing anti-ransomware products, Nyotron security researchers warn.Dubbed RIPlace, the technique allows malware to bypass defenses using the legacy file system "rename" operation, and the security researchers say it is effective even agains
Publish At:2019-11-25 22:15 | Read:371 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Malware

Meet Phoenix Keylogger, a New Malware-as-a-Service Product Gaining Traction

Phoenix Keylogger Attempts to Disable More Than 80 security Products, Exfiltrates Data Direct from MemoryThe Phoenix Keylogger, operating at the cusp of keylogger and infostealer, was launched in July 2019. It is sold as malware-as-a-service (MaaS), and appears to be gaining traction in the criminal underworld.Nocturnus, the research team from Cybereaso
Publish At:2019-11-20 22:15 | Read:415 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Malware

Threat Hunting or Efficiency: Pick Your EDR Path?

“Do You Want It Done Fast, Or Do You Want It Done Right?” “Yes.” “Help out more with our business objectives.” “Cover an increasing number of endpoints.” “Cut budgets.” “Make it all work without adding staff.” Cybersecurity teams face a lot of conflicting objectives—both within their teams and from upper management. But a May 2019 commissioned study conducte
Publish At:2019-11-12 11:20 | Read:332 | Comments:0 | Tags:Endpoint Security

Fortinet Acquires Endpoint Security Firm enSilo

Fortinet on Monday announced that it has completed the acquisition of San Francisco-based endpoint security company enSilo in an effort to enhance and strengthen its solutions.Through the acquisition, Fortinet adds enSilo’s detection and response technology to its Security Fabric framework, which enables organizations to manage different segments of network
Publish At:2019-10-28 22:15 | Read:1152 | Comments:0 | Tags:Endpoint Security Network Security NEWS & INDUSTRY Manag

Microsoft Invests in Securing Device Firmware

Microsoft is working with PC manufacturing and silicon partners to design devices with a more secure firmware layer.The initiative aims to combat threats that are specifically targeting the firmware and operating system levels with the help of Secured-core PCs, devices that apply security best practices to firmware.These devices, the technology giant explain
Publish At:2019-10-22 22:15 | Read:486 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Symantec Endpoint Protection Update Causes Many Devices to Crash

An intrusion prevention signature update pushed out this week by Symantec for its Endpoint Protection product has caused many devices to crash and display a so-called blue screen of death (BSOD).After users started complaining on Symantec’s support forums and other websites, the cybersecurity firm released another update to address the issue. The version tha
Publish At:2019-10-16 12:00 | Read:486 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Incident Response

Microsoft Makes Tamper Protection in Defender ATP Generally Available

Microsoft is now providing all of its Defender ATP (Advanced Threat Protection) customers with tamper protection, which is meant to prevent unauthorized changes to security features.The feature was launched as a hardening solution to prevent attacks where malicious applications or threat actors attempt to disable Windows Defender Antivirus, modify real-time
Publish At:2019-10-15 12:00 | Read:331 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY

Defining Cloud Security – Is It the Endpoint, Your Data, or the Environment?

You’ve heard it once; you’ve heard it a hundred times – “secure the cloud.” But what does that phrase mean? On the surface, it’s easy to assume this phrase means using cloud-enabled security products. However, it’s much more than that. Cloud security is about securing the cloud itself through a combination of procedures, policies, and technologies that work
Publish At:2019-10-14 11:20 | Read:1903 | Comments:0 | Tags:Endpoint Security Cloud


Share high-quality web security related articles with you:)


Tag Cloud