Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent.
Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.
Recent attack campaigns involving the Qbot banking Trojan have been using a new persistence mechanism that helps the threat avoid detection, according to security researchers.
Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?
Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats.
Security researchers spotted a new attack campaign that's targeting organizations in several countries with a new variant of Qbot banking malware.