Endpoint Security

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks 2025-05-14 at 17:34 By Eduard Kovacs Intel, AMD and Arm each published security advisories on Patch Tuesday, including for newly disclosed CPU attacks. The post Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks appeared first on SecurityWeek. This article is an […]

React to this headline:

Loading spinner

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Read More »

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428) 2025-05-13 at 20:31 By Zeljka Zorz Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited” number of customers, Ivanti has confirmed on Tuesday, and urged customers to install a patch as soon as possible. “The

React to this headline:

Loading spinner

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428) Read More »

CrowdStrike Plans Layoffs to Pursue $10B ARR Target

CrowdStrike Plans Layoffs to Pursue $10B ARR Target 2025-05-07 at 19:03 By SecurityWeek News CrowdStrike said the planned cuts will affect approximately 500 employees and will span the first half of fiscal 2026. The post CrowdStrike Plans Layoffs to Pursue $10B ARR Target appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

CrowdStrike Plans Layoffs to Pursue $10B ARR Target Read More »

AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover

AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover 2025-04-30 at 11:19 By Ionut Arghire Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction. The post AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover Read More »

Mobile security is a frontline risk. Are you ready?

Mobile security is a frontline risk. Are you ready? 2025-04-30 at 08:33 By Help Net Security The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the primary attack surfaces.

React to this headline:

Loading spinner

Mobile security is a frontline risk. Are you ready? Read More »

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover 

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover  2025-03-18 at 18:33 By Eduard Kovacs A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover  appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover  Read More »

NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation

NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation 2025-02-24 at 17:33 By SecurityWeek News Texas automated endpoint management vendor banks $500 million infusion in Series C extensions that values the company at $5 billion.  The post NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation appeared first on SecurityWeek. This

React to this headline:

Loading spinner

NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation Read More »

Unknown and unsecured: The risks of poor asset visibility

Unknown and unsecured: The risks of poor asset visibility 2025-02-20 at 07:34 By Mirko Zorz In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge. She explains how to maintain security without slowing down operations, shares ways to improve visibility in OT environments, and explains

React to this headline:

Loading spinner

Unknown and unsecured: The risks of poor asset visibility Read More »

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement 2025-02-17 at 13:03 By Ionut Arghire Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers. The post Xerox Versalink Printer Vulnerabilities Enable Lateral Movement appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement Read More »

Sophos Completes Acquisition of Secureworks

Sophos Completes Acquisition of Secureworks 2025-02-04 at 22:18 By SecurityWeek News Sophos has completed its $859 million all-cash acquisition of SecureWorks. The post Sophos Completes Acquisition of Secureworks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Sophos Completes Acquisition of Secureworks Read More »

AMD Patches CPU Vulnerability Found by Google

AMD Patches CPU Vulnerability Found by Google 2025-02-04 at 15:33 By Ionut Arghire AMD has released patches for a microprocessor vulnerability that could allow an attacker to load malicious microcode. The post AMD Patches CPU Vulnerability Found by Google appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

AMD Patches CPU Vulnerability Found by Google Read More »

New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones

New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones 2025-01-29 at 14:48 By Eduard Kovacs New CPU side-channel attacks named SLAP and FLOP can be exploited to remotely steal data from Apple mobile and desktop devices.  The post New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones appeared first

React to this headline:

Loading spinner

New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones Read More »

5 reasons to double down on network security

5 reasons to double down on network security 2024-12-02 at 07:33 By Help Net Security Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter, forcing organizations to update their defense strategies. Today, with the rise of work-from-anywhere and bring-your-own-device (BYOD) policies as well as

React to this headline:

Loading spinner

5 reasons to double down on network security Read More »

Attackers deploying red teaming tool for EDR evasion

Attackers deploying red teaming tool for EDR evasion 2024-10-15 at 17:16 By Zeljka Zorz Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed. About EDRSilencer The software, which is intended for red teaming, is being abused to “silence” EDR solutions. It works by leveraging

React to this headline:

Loading spinner

Attackers deploying red teaming tool for EDR evasion Read More »

Controversial Windows Recall AI Search Tool Returns With Proof-of-Presence Encryption, Data Isolation

Controversial Windows Recall AI Search Tool Returns With Proof-of-Presence Encryption, Data Isolation 2024-09-27 at 21:01 By Ryan Naraine Microsoft reboots controversial Windows Recall with proof-of-presence encryption, anti-tampering checks, and secure enclave data management. The post Controversial Windows Recall AI Search Tool Returns With Proof-of-Presence Encryption, Data Isolation appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Controversial Windows Recall AI Search Tool Returns With Proof-of-Presence Encryption, Data Isolation Read More »

Kaspersky, Pango Respond to User Backlash as Transition to UltraAV Nearly Complete

Kaspersky, Pango Respond to User Backlash as Transition to UltraAV Nearly Complete 2024-09-27 at 13:31 By Ionut Arghire Users continue to flame Kaspersky and Pango Group as the automatic, forced transition to UltraAV gradually progresses. The post Kaspersky, Pango Respond to User Backlash as Transition to UltraAV Nearly Complete appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Kaspersky, Pango Respond to User Backlash as Transition to UltraAV Nearly Complete Read More »

Users Quick to Remove UltraAV After Silent Transition From Kaspersky Antivirus

Users Quick to Remove UltraAV After Silent Transition From Kaspersky Antivirus 2024-09-24 at 14:01 By Ionut Arghire Many US users are voicing concerns over the silent, forced transition from Kaspersky’s security products to UltraAV. The post Users Quick to Remove UltraAV After Silent Transition From Kaspersky Antivirus appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Users Quick to Remove UltraAV After Silent Transition From Kaspersky Antivirus Read More »

Cybersecurity Products Conking Out After macOS Sequoia Update

Cybersecurity Products Conking Out After macOS Sequoia Update 2024-09-23 at 15:01 By Ionut Arghire macOS Sequoia updates are causing cybersecurity software failures and breaking network connectivity for many. The post Cybersecurity Products Conking Out After macOS Sequoia Update appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Cybersecurity Products Conking Out After macOS Sequoia Update Read More »

Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel

Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel 2024-09-13 at 21:45 By Ryan Naraine Microsoft is revamping how anti-malware tools interact with the Windows kernel to avoid another CrowdStrike faulty update catastrophe.  The post Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel Read More »

New RAMBO Attack Allows Air-Gapped Data Theft via RAM Radio Signals

New RAMBO Attack Allows Air-Gapped Data Theft via RAM Radio Signals 2024-09-09 at 16:32 By Ionut Arghire An academic researcher has devised a new method of exfiltrating data from air-gapped systems using radio signals from memory buses. The post New RAMBO Attack Allows Air-Gapped Data Theft via RAM Radio Signals appeared first on SecurityWeek. This

React to this headline:

Loading spinner

New RAMBO Attack Allows Air-Gapped Data Theft via RAM Radio Signals Read More »

Scroll to Top