#endpoint-protection

[ follow ]
#windows-security
fromtheregister
3 hours ago
Information security

Mystery Microsoft bug leaker keeps the zero-days coming

YellowKey enables attackers with physical access to bypass BitLocker and gain unrestricted shell access, turning stolen laptops into potential breach events.
fromZDNET
10 months ago
European startups

Microsoft rolls out Windows security changes to prevent another CrowdStrike meltdown

Microsoft is implementing significant changes to Windows endpoint security to prevent disasters like the CrowdStrike meltdown.
New Windows capabilities allow security solutions to run outside the Windows kernel for improved reliability.
Information security
fromtheregister
3 hours ago

Mystery Microsoft bug leaker keeps the zero-days coming

YellowKey enables attackers with physical access to bypass BitLocker and gain unrestricted shell access, turning stolen laptops into potential breach events.
fromZDNET
10 months ago
European startups

Microsoft rolls out Windows security changes to prevent another CrowdStrike meltdown

Information security
fromTechzine Global
3 weeks ago

Aikido Endpoint offers developers additional protection against supply chain attacks

Aikido Endpoint protects developers' endpoints from supply chain attacks by blocking high-risk installations before they reach the system.
#ai-security
Information security
fromTechzine Global
1 month ago

CrowdStrike Falcon Update Makes the Endpoint the Hub for AI Security

CrowdStrike enhances the Falcon platform with new AI security features, making endpoints central to detecting and managing AI applications.
Information security
fromTechzine Global
1 month ago

CrowdStrike Falcon Update Makes the Endpoint the Hub for AI Security

CrowdStrike enhances the Falcon platform with new AI security features, making endpoints central to detecting and managing AI applications.
DevOps
fromTechzine Global
1 month ago

NinjaOne launches Vulnerability Management for detection and remediation

NinjaOne's Vulnerability Management solution enables real-time vulnerability detection and automated remediation integrated into a single workflow, eliminating delays from traditional periodic scanning approaches.
Information security
fromBusiness Insider
2 months ago

This Israeli cyber startup is launching with $40 million in funding during the Iran war: 'It's part of our reality and part of our strength'

Israeli cybersecurity startup Bold raised $40 million and launched AI agents protecting enterprise devices from cyberattacks while operating during wartime.
Information security
fromSecurityWeek
2 months ago

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
fromThe Hacker News
3 months ago

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can't absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response.
Information security
Privacy technologies
fromTechzine Global
9 months ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
fromTechzine Global
9 months ago

Scale Computing and Bitdefender join forces for edge security

The integration combines Scale Computing's Hypercore platform with Bitdefender's GravityZone to secure workloads, virtual desktops, and data in edge environments.
Tech industry
fromTheregister
11 months ago

SentinelOne back online after lengthy outage

The SentinelOne outage lasted for at least six hours, impacting numerous products, including threat intelligence services and the Singularity Endpoint protection service.
Information security
[ Load more ]