When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
Researchers from Kaspersky Lab recently discovered a new backdoor Trojan, called CowerSnail, that targets Windows computers.
Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.
Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
A unified app catalog can help IT leaders properly manage the mobile workforce and secure disparate applications running on different operating systems.
Going Through a Rough Patch in Your Security Program? Consistent Software Patching Can Solve Security Woes
Effective and consistent software patching can solve the majority of common security challenges, yet many organizations struggle with patch management.
Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.