New Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level

May 29, 2024 at 08:12AM Cigent Technology introduces new endpoint data protection platform focusing on preventing ransomware by safeguarding customer data from encryption and exfiltration. The approach prioritizes data protection to prevent the need for response post-detection. The solution provides user-friendly, automatic encryption and MFA authentication, with flexibility in protecting files and integrating with existing … Read more

RSA Conference 2024 – Announcements Summary (Day 3)

May 9, 2024 at 05:18AM The 2024 RSA Conference in San Francisco featured numerous product and service announcements. Highlights from the third day include AuditBoard’s InfoSec Solutions enhancements, Cado Security’s forensic investigations in distroless container environments, and CrowdStrike and NinjaOne’s partnership for endpoint protection. CyberSaint, Cyolo, ForAllSecure, Netcraft, OpenText, SentinelOne, and Skyhigh Security also introduced … Read more

Kaspersky Unveils New Flagship Product Line for Business, Kaspersky Next

April 16, 2024 at 05:04PM Kaspersky introduced its new flagship product line, Kaspersky Next, offering robust endpoint protection with EDR and XDR capabilities. The product is tailored to different business requirements and IT infrastructures. It provides advanced cybersecurity solutions, deployment flexibility, and automation features. The product comes in three tiers to meet varying security needs. … Read more

Proper DDoS Protection Requires Both Detective and Preventive Controls

April 9, 2024 at 01:59PM The security profession uses preventive and detective controls to reduce risk. Preventive controls aim to lessen potential threats, while detective controls identify security issues post-incident. However, the prevalence of DDoS attacks underscores the need for more emphasis on preventive controls. Steps to enhance DDoS protection include vulnerability checks, staying nondisruptive, … Read more

Implementing Zero Trust Controls for Compliance

March 22, 2024 at 07:27AM The ThreatLocker® Zero Trust Endpoint Protection Platform enforces a strict deny-by-default, allow-by-exception security posture to protect organizations from various cyber threats, promoting compliance with multiple frameworks. The platform offers free guidance on implementing compliance best practices, covering 24 technical controls across different compliance frameworks. Download the free guide for more … Read more

‘Magnet Goblin’ Exploits Ivanti 1-Day Bug in Mere Hours

March 12, 2024 at 04:11PM Threat actors targeted Ivanti edge devices earlier this year. One-day exploit CVE-2024-21887 in Ivanti Connect Secure and Policy Secure gateways, rated 9.1/10, was quickly capitalized on by “Magnet Goblin.” Known for exploiting one-days in public-facing services, this group deploys malware capable of flying under the radar, emphasizing the need for … Read more

Magnet Goblin hackers use 1-day flaws to drop custom Linux malware

March 10, 2024 at 11:42AM Magnet Goblin, a financially motivated hacking group, exploits 1-day vulnerabilities to breach public-facing servers and deploy custom malware on Windows and Linux systems. They target devices and services like Ivanti Connect Secure, Apache ActiveMQ, ConnectWise ScreenConnect, Qlik Sense, and Magento. Check Point analysts emphasize the importance of timely patching and … Read more

Fresh ‘Mispadu Stealer’ Variant Emerges

February 5, 2024 at 05:43PM The Palo Alto Networks Unit 42 team uncovered a new variation of the sneaky banking Trojan, Mispadu Stealer, targeting Mexico. This infostealer exploits the Windows SmartScreen bypass vulnerability CVE-2023-36025. With Mispadu continuously evolving, the researchers advise a comprehensive cybersecurity approach, emphasizing staying informed on threat intelligence, robust endpoint protection, and … Read more

Hands-On Review: SASE-based XDR from Cato Networks

February 5, 2024 at 08:45AM XDR platforms help companies detect threats by correlating indicators from security domains. Cato Networks’ “SASE-based” XDR leverages native sensors to provide detailed threat analysis. Through intuitive dashboards, analysts can assess and mitigate threats, ultimately simplifying incident response. Cato’s streamlined approach demonstrates a commitment to enhancing threat detection and response capabilities. … Read more

CMMC Is the Starting Line, Not the Finish

February 1, 2024 at 10:09AM The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) is a significant nudge for companies in the defense industrial base and critical infrastructure to enhance cybersecurity. However, achieving CMMC compliance alone may not safeguard against sophisticated threats such as China’s PLA Unit 61398. To truly protect against cyber threats, companies … Read more