5 links tagged with all of: cybersecurity + security-tools
Click any tag below to further narrow down your results
Links
This article discusses how complexity in security environments hampers effective detection and response, with the network serving as a crucial source of visibility. It emphasizes the importance of investigation over mere detection and highlights continuous packet capture as a key tool for improving response times and collaboration between security teams.
This article discusses upcoming changes in cybersecurity, emphasizing the shift towards using AI agents to manage security tasks due to the challenges of hiring and retaining skilled personnel. It highlights the need for improved asset management and the potential pitfalls of relying on automated systems, including the risk of accumulating technical debt.
Effective cybersecurity requires complete visibility and integration of IT asset inventories. By aggregating data from various security tools, organizations can identify gaps in their security posture, improve control coverage, and enhance operational efficiency, ultimately reducing the risk of breaches.
The article discusses the technical workings of an EDR (Endpoint Detection and Response) freeze tool, detailing how it operates to prevent malicious activities on endpoints. It highlights key functionalities and the underlying technology that empowers this security measure in protecting systems from threats.
Hackers are exploiting a vulnerability in domain name system (DNS) records to hide malware, allowing malicious scripts to fetch binaries without detection by traditional security measures. Researchers from DomainTools discovered that malware was encoded in hexadecimal and distributed across multiple subdomains, enabling retrieval through seemingly harmless DNS requests. As encrypted DNS methods like DOH and DOT gain traction, monitoring this type of traffic may become even more challenging.