Endpoint
Data sprawl: why application access controls as a security strategy doesn’t work
Laura Case, Director of Product Management | | Data encryption, Data Security, privacy regulations, sensitive data
As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep ...
Google Pushes ‘Passkeys’ Plan — but it’s Too Soon for Mass Rollout
Richi Jennings | | 2 factor auth, 2-fa authentication, 2-factor authentication, 2fa, 2FA Authenticator, 2FA/MFA, advanced authentication, auth, Authentication, biometric, biometric authentication, biometric identification, biometric security, biometrics, biometrics authentication, Biometrics-Based Authentication, FIDO, FIDO Alliance, FIDO2, google, MFA, MFA rollout, Multi-Factor Authentication (MFA), Passkeys, passwordless, passwordless login, passwordless-authentication, PKI-based passwordless authentication, SB Blogwatch, two-factor-authentication.2fa, WebAuthn
FIDO FAIL: “Killing passwords” is a worthy goal—but is coercion the best way? ...
Security Boulevard
Cloudflare, Google, AWS Battle Record-Setting ‘Rapid Reset’ DDoS Attacks
Cloud giants Amazon Web Services, Google, and Cloudflare are warning about a novel zero-day vulnerability in the HTTP/2 protocol that allows threat groups to launch massive distributed denial-of-service (DDoS) attacks that dwarf ...
Security Boulevard
Heads Up: Patch for ‘Worst Curl Security Flaw’ Coming This Week
Developers who use the popular curl open-source data transfer tool will be able to patch two vulnerabilities in the software on October 11, one of which the lead developer called the “worst ...
Security Boulevard
Google, Yahoo to Put Tighter Spam Restrictions on Bulk Senders
Email giants Google and Yahoo are putting tighter requirements on bulk email senders in hopes of reducing the massive amounts of spam that hammer inboxes every day and deflecting the phishing and ...
Security Boulevard
iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain
Richi Jennings | | Apple, Apple iPhone, Apple zero-day, CVE-2023-42824, CVE-2023-5217, iOS 7, iPadOS Vulnerability, iPhone, iPhone and iPad, iphone update, SB Blogwatch, Zero Day Attacks, zero-day vulnerabilities, Zero-day Vulnerability, zero-days
Apple’s embarrassing regression: iOS 17.0.3 fixes yet more nasty zero-days (and the overheating bug) ...
Security Boulevard
The Crucial Difference Between Pre- and Post-Delivery Email Scanning
Rom Hendler | | email, email security, endpoint, post-delivery, pre-delivery, scanning, Web security
Some major cybersecurity vendors are demonstrating significant flaws because their solutions don’t filter emails until after they reach the Exchange server ...
Security Boulevard
SIM Swapping Attacks Hit High-Profile Targets
Cybercriminals crave breaching the networks of large organizations. These large corporations hold vast amounts of sensitive information and often protect these assets with enterprise-grade security. Although breaking into these systems isn’t easy, ...
Broken ARM: Mali Malware Pwns Phones
Richi Jennings | | android, ARM, CVE-2023-33200, CVE-2023-34970, CVE-2023-4211, GPU, hardware supply chain, Linux, Mali, open source software supply chain, SB Blogwatch, software supply chain, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks
Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver ...
Security Boulevard
What Is Endpoint Detection and Response (EDR)?
Kaseya | | Compliance, Cybersecurity, EDR, endpoint detection and response, Endpoint Monitoring, Endpoint security, remote endpoint security
Endpoint detection and response (EDR) is among the latest breed of security software designed to keep emerging and sophisticated cyberthreatsRead More The post What Is Endpoint Detection and Response (EDR)? appeared first ...