Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Podcast, Ep. 286 - BatBadBut What?

This week on #the443podcast, we cover a research post describing a code injection vulnerability caused by how nearly every high-level programming language runs on Windows. We also discuss a series of vulnerabilities in LG televisions that allow remote attackers to root the device before ending with a chat about new adversarial tactics for delivering malware via GitHub.

The 443 Podcast - Episode 288 - Cisco ArcaneDoor Attack

This week on the podcast, we cover a nation-state backed attack against Cisco ASA appliances which Cisco TALOS themselves have dubbed "ArcaneDoor." After that, we discuss a phishing tookit being used to target LastPass users before ending with a new way to deliver malware payloads using legitimate services. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

A Postmortem of Microsoft's Security Incident - The 443 Podcast

🔈📽️ This week on the podcast, Corey Nachreiner and Marc Laliberte cover a report from the Department of Homeland Security's Cyber Safety Review Board that analyzes Microsoft's Exchange Online 2023 security incident in excruciating detail. Before that, we cover CISA's new rules around cyber incident reporting and an unsealed indictment against 7 Chinese nationals.

Powering your MSP Business by Offering Access Management

The market for managed services is poised for continued growth with cybersecurity being in high demand. Small and midsize businesses (SMBs) are increasingly concerned about protecting their people, data, applications, and Cloud workloads from risks, and many SMBs are now familiar with the MSP model and becoming more selective.

Enhancing Endpoint Security with Advanced Host-Based Intrusion Detection Capabilities

In 2023, companies lost about $4.45 million on average because of data breaches. As cyber threats advance, securing endpoints is more important than ever. An advanced Host-based Intrusion Detection System (HIDS) provides a sturdy remedy to improve endpoint security. By monitoring and examining system responses and device status, HIDS identifies and tackles nefarious behaviors that are often overlooked by conventional defenses.

7 Best Endpoint Management & Monitoring Software in 2024

Endpoint management and monitoring are critical for maintaining an organization’s IT infrastructure’s security, performance, and efficiency. Whether you’re dealing with remote workers, corporate devices, or virtual endpoints, having reliable endpoint management tools is essential. In this article, we’ll explore some of the top solutions available.