Zephyrnet Logo

Tag: Endpoint detection

Vulnerabilities in business VPNs under the spotlight

Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for...

Top News

CMMC Is the Starting Line, Not the Finish

COMMENTARYOver the past few years, it has become painfully clear that companies in the defense industrial base (DIB) and those providing critical infrastructure are...

Why Red Teams Can’t Answer Defenders’ Most Important Questions

COMMENTARYIn 1931, scientist and philosopher Alfred Korzybski wrote, "The map is not the territory." He meant that all models, like maps, leave out some...

Threat Group Using Rare Data Transfer Tactic in New RemcosRAT Campaign

A threat actor known for repeatedly targeting organizations in Ukraine with the RemcosRAT remote surveillance and control tool is back at it again, this...

Inside the Mind of a Cyber Attacker! – Supply Chain Game Changer™

In the perpetual game of cat and mouse between cyber attackers and defenders, the battleground is vast and dynamic. Understanding the Tactics, Techniques, and...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Why CISOs Need to Make Cyber Insurers Their Partners

In the current threat landscape, the relationship between cyber-insurance providers and potential (or even current) policyholders is often strained, at best. Organizations may perceive...

3 Essential Compliance Regulations for Data Security in Remote Work

Remote work has surged in popularity, transforming how you approach your daily tasks and where you perform them. This shift means you’re no longer...

Chinese ‘Stayin’ Alive’ Attacks Dance Onto Targets With Dumb Malware

Chinese advanced persistent threats (APTs) are known for being sophisticated, but the "ToddyCat" group is bucking the trend, compromising telecommunications organizations in Central and Southeast...

The Need for Speed: When Cloud Attacks Take Only 10 Minutes

In the fast-paced landscape of cloud security, attacks have become a formidable adversary. As organizations migrate their data and applications to the cloud, malicious...

How to detect and patch a Log4J vulnerability  – IBM Blog

How to detect and patch a Log4J vulnerability  - IBM Blog <!----> ...

Advanced endpoint protection vs. risk-based application patching vs. laptop management: Similarities and differences – IBM Blog

Advanced endpoint protection vs. risk-based application patching vs. laptop management: Similarities and differences - IBM Blog <!----> ...

Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs | WeLiveSecurity

Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?