The cryptocurrency division of Robinhood has been slapped with a $30 million penalty for "significant violations" of New York state's cybersecurity and money laundering regulations. [Read More]
VMware patches dangerous security flaw that allows malicious actor with network access to the UI to obtain administrative access without the need to authenticate. [Read More]
Cybersleuths at Microsoft discover a link between the recent ‘Raspberry Robin’ USB-based worm attacks and the notorious EvilCorp ransomware operation. [Read More]
To circumvent Microsoft’s recent macro-blocking feature, threat actors are now embedding their macro-enabled documents in ISO, RAR, and similar file types. [Read More]
In testimony before the the US House Intelligence Committee, security pros at Google and Citizen Lab make fresh calls for a wholesale clampdown on problematic commercial spyware vendors. [Read More]
Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. [Read More]
A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. [Read More]
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.