Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected "threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading … [Read more...] about Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
security
Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers to a processor on the device that's responsible for handling all connectivity, such as LTE, 4G, and 5G, … [Read more...] about Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks
Elevating Identity Security at Fal.Con 2024
This blog is part of a five-part series previewing Fal.Con 2024 content. Read previews for cloud, AI and next-gen SIEM. In today’s threat landscape, identity is a primary adversary target and plays a central role in most breaches. The CrowdStrike 2024 Threat Hunting Report states 5 of the top 10 MITRE tactics observed in the past 12 months are identity-based. The reality is … [Read more...] about Elevating Identity Security at Fal.Con 2024
Take Your Endpoint Security to New Heights at Fal.Con 2024
This blog is part of a five-part series previewing Fal.Con 2024 content. Read previews for cloud, AI, next-gen SIEM and identity. Endpoint security remains the foundation of modern cyber defense. It’s where all businesses operate and most attacks begin. For these reasons, organizations must evolve their endpoint security to stay ahead of increasingly fast and stealthy threat … [Read more...] about Take Your Endpoint Security to New Heights at Fal.Con 2024
Fal.Con 2024 – Innovations in Cloud Security
As we gather for Fal.Con 2024, we’re thrilled to unveil groundbreaking advancements in CrowdStrike Falcon® Cloud Security that are set to redefine cloud security. These innovations are more than just technical enhancements — they’re a bold step towards a future where unified security posture management (USPM) across cloud infrastructure, applications, data and AI becomes the … [Read more...] about Fal.Con 2024 – Innovations in Cloud Security
Improving Operational Efficiencies and Providing Tighter Integrations with Cisco Security Products
The recent CrowdStrike outage illustrated the importance of resilience across our organizations. While that case was specifically related to operating system and application resilience, network resilience is just as critical to today’s business systems. The 2023 Cisco Security Outcomes Report found that 61% of respondents had experienced a breach that impacted the resilience … [Read more...] about Improving Operational Efficiencies and Providing Tighter Integrations with Cisco Security Products
Cloud Security Takes the Stage at Fal.Con 2024
Cloud adoption has revolutionized organizations in recent years, driven by its ability to prevent data loss, enhance security through centralized management, drive resource scalability and reduce costs. Most organizations are already reaping the benefits of cloud transformation. Along with the advantages of cloud adoption come new and evolving risks. Adversaries are growing … [Read more...] about Cloud Security Takes the Stage at Fal.Con 2024
How Hybrid Mesh Firewalls Shape Modern Security
The traditional castle-and-moat model of cybersecurity is outdated due to the evolving perimeter caused by remote work and fluid data access. Organizations must integrate security at every touchpoint. The proliferation of IoT devices increases entry points for cybercriminals, necessitating a unified approach to endpoint security. Advanced technologies like AI and quantum … [Read more...] about How Hybrid Mesh Firewalls Shape Modern Security
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
Aug 28, 2024Ravie LakshmananVulnerability / Data Security Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, tracked as CVE-2024-6633, carries a CVSS score of 9.8, and stems from the use of a static password to connect to a HSQL database. "The default … [Read more...] about Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
CrowdStrike’s Kernel Access and Security Architecture
Context In today’s rapidly evolving threat landscape, the need for dynamic security measures is critical. Due to Windows’s current architecture and design, security products running in the platform, particularly those involved in endpoint protection, require kernel access to provide the highest level of visibility, enforcement and tamper-resistance, while meeting the strict … [Read more...] about CrowdStrike’s Kernel Access and Security Architecture