HackDig : Dig high-quality web security articles for hacker

Making Cloud Security a Team Sport

While most large enterprises are moving to the cloud in some form, the path is never as direct as chief information officers (CIOs) and chief information security officers (CISOs) might like it to be. Most come to terms with the fact that the cloud won’t be a single offering, but rather a hybrid multicloud that aligns critical applications with cloud s
Publish At:2020-02-21 09:34 | Read:100 | Comments:0 | Tags:Cloud Security Cloud Cloud Adoption Cloud Infrastructure Clo

Microsoft Threat Protection Now Generally Available

Microsoft this week announced the general availability of Microsoft Threat Protection, its integrated security solution aimed at offering protection across users, email, applications, and endpoints.Released in public preview in December 2019, the solution builds on Microsoft Defender Advanced Threat Protection (ATP), Office 365 ATP, Azure ATP, and Microsoft
Publish At:2020-02-20 12:45 | Read:176 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Cl

SentinelOne Achieves Unicorn Status After $200 Million Funding Round

Endpoint security firm SentinelOne on Wednesday announced that it has raised $200 million in a Series E funding round, at a valuation of more than $1.1 billion, which gives the company “unicorn” status.The latest funding round, which brings the total raised by SentinelOne to $430 million, was led by Insight Partners, with participation from Tiger Global Mana
Publish At:2020-02-19 14:46 | Read:195 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Management & Strat

Chrome Will Block Insecure Downloads on HTTPS Pages

In an attempt to improve the security of its users, the Chrome browser will soon start blocking insecure downloads on HTTPS pages, Google announced.The plan, which the Internet giant laid out this week, is expected to be completed sometime in the fall, when Chrome 86 arrives.The announcement comes just days after the release of Chrome 80, which by default bl
Publish At:2020-02-07 22:15 | Read:183 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Ri

Devices Still Vulnerable to DMA Attacks Despite Protections

Many devices, including ones often found in enterprise environments, are likely still vulnerable to direct memory access (DMA) attacks, despite the fact that hardware and software vendors have implemented protections that should prevent such attacks, firmware security company Eclypsium said on Thursday.DMA is designed to allow hardware components or peripher
Publish At:2020-01-30 10:15 | Read:354 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric Hack

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.Discovered in June 2019 but disclosed only last week, the data breach impacted both employee and corporate data at the Japan
Publish At:2020-01-27 10:15 | Read:270 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vu

Peter Leav Named CEO of McAfee

Cybersecurity firm McAfee announced on Thursday that its board of managers has appointed Peter Leav as the company’s new chief executive officer after Chris Young decided to step down.Leav will take on the role of CEO on February 3 and he will also be appointed to the company’s board of managers. Young will stay on in an advisory role to assist with the tran
Publish At:2020-01-17 10:15 | Read:390 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Management & Strat

NSA Discloses Serious Windows Vulnerability to Microsoft

The U.S. National Security Agency (NSA) has informed Microsoft that Windows is affected by a potentially serious spoofing vulnerability that could allow hackers to make a malicious file appear to come from a trusted source or conduct man-in-the-middle (MitM) attacks.The NSA reached out to reporters to inform them about the vulnerability before Microsoft rele
Publish At:2020-01-14 22:15 | Read:314 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vu

Microsoft Security Essentials Will Not Protect Windows 7 PCs After January 14, 2020

Microsoft Security Essentials (MSE) will stop protecting Windows 7 PCs on January 14, 2020, when support for Windows 7 is set to end.Organizations that cannot update their systems from Windows 7 to Windows 10 until January 14 can continue receiving patches for critical and important vulnerabilities for up to another three years if they purchase Extended Secu
Publish At:2019-12-12 10:15 | Read:556 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Risk Management Manage

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a silent alarm. A handful of the best
Publish At:2019-12-06 16:45 | Read:560 | Comments:0 | Tags:Endpoint Security endpoint EDR

Endpoint Security 301: When Products, Policies, and People Break Down the Lines of Communication

Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats may not get the insights unco
Publish At:2019-12-06 16:45 | Read:449 | Comments:0 | Tags:Endpoint Security Endpoint security endpoint mvision EDR sec

Intel Announces Compute Lifecycle Assurance to Protect Platform Supply Chains

Globalization and business transformation have created an incredibly complex worldwide supply chain for almost all manufacturers. Hardware ostensibly manufactured in the U.S. will inevitably include components manufactured in many different locations around the world -- including nations that are in other circumstances described as 'adversary states'.The pot
Publish At:2019-12-04 22:15 | Read:349 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY

Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

Vulnerabilities discovered in Kaspersky Secure Connection, Trend Micro Maximum Security, and Autodesk Desktop Application could be exploited for DLL preloading, code execution, and privilege escalation, a security firm has warned.According to SafeBreach, Kaspersky Secure Connection (KSDE), a VPN client used with various Kaspersky applications, including Secu
Publish At:2019-12-02 22:15 | Read:591 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Vulnerabilities

New Technique Allows Ransomware to Operate Undetected

A recently discovered technique allows ransomware to encrypt files on Windows-based systems without being detected by existing anti-ransomware products, Nyotron security researchers warn.Dubbed RIPlace, the technique allows malware to bypass defenses using the legacy file system "rename" operation, and the security researchers say it is effective even agains
Publish At:2019-11-25 22:15 | Read:476 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Malware

Meet Phoenix Keylogger, a New Malware-as-a-Service Product Gaining Traction

Phoenix Keylogger Attempts to Disable More Than 80 security Products, Exfiltrates Data Direct from MemoryThe Phoenix Keylogger, operating at the cusp of keylogger and infostealer, was launched in July 2019. It is sold as malware-as-a-service (MaaS), and appears to be gaining traction in the criminal underworld.Nocturnus, the research team from Cybereaso
Publish At:2019-11-20 22:15 | Read:686 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Malware


Share high-quality web security related articles with you:)


Tag Cloud