home.social

#endpoint-security — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #endpoint-security, aggregated by home.social.

fetched live
  1. Running Ubuntu 26.04 LTS as a daily driver, enrolled in Microsoft Intune with MDE, and it just works.

    Linux endpoint management has come a long way. Zero friction, full compliance.

    #Ubuntu #Intune #MDE #Linux #EndpointSecurity #Microsoft

  2. Join us on Wednesday, March 4 at 11 a.m. EST for a live webinar on how to reduce endpoint risk without disrupting users or IT workflows with Keeper Endpoint Privilege Manager.

    We’ll cover how to defend against today’s most common endpoint-based attack techniques, reduce risk by removing local admin rights without impacting productivity, apply least-privilege access controls across Windows, macOS and Linux, and protect users from memory-based attacks.

    Register here 👉 bit.ly/4aQV1eE.

    #KeeperSecurity #Cybersecurity #EndpointSecurity #PrivilegedAccess #Webinar

  3. New by me: I’ve been seeing a spike in unwanted apps (PUPs/adware) sneaking onto client endpoints, so I built a practical workaround when allowlisting tools aren’t in the budget.

    This post walks through:
    ✅ a PowerShell cleanup script (Audit vs Remediate)
    ✅ a JSON “bad app” list you can update over time
    ✅ how to automate it in your RMM (with a Kaseya VSA X example)
    ✅ why I avoid Win32_Product and how the fallback config works

    MSPs: this is endpoint hygiene, not magic, but it’s consistent and scalable.

    kylereddoch.me/blog/fighting-t

    #MSP #PowerShell #RMM #Windows #Cybersecurity #EndpointSecurity #Kaseya

  4. Recent research highlights a phishing campaign leveraging tax-related lures to deploy ValleyRAT, a modular RAT with strong persistence and evasion features.

    The infection chain demonstrates continued abuse of trusted binaries, DLL sideloading, and plugin-based architectures to enable targeted post-compromise activity. The campaign underscores the importance of monitoring user-facing entry points and low-noise persistence mechanisms.

    Open to insights on effective detection and response strategies for similar campaigns.
    Follow TechNadu for objective threat intelligence reporting.

    #InfoSec #ThreatHunting #MalwareAnalysis #PhishingDefense #EndpointSecurity #CyberThreats

  5. We often find built-in Windows defences disabled or misconfigured during assessments. Those same controls can help stop credential theft, boot-level malware, and memory attacks when properly configured.

    In our latest blog post, Nicole walks through five Windows security features you should be using, explains what they do, why they matter, and how to check them on your systems.

    📌pentestpartners.com/security-b

    #windowssecurity #incidentresponse #endpointsecurity #cybersecurity #dfir

  6. THE SECURITY PARADOX: How Desktop OS Indexing Un-Encrypts Your E2E Sync Folders

    E2E services protect data in transit and cloud. But when your sync client decrypts files to local disk, your OS indexer treats it as plaintext.

    macOS Spotlight, Windows Search, and Linux indexers (Tracker/Baloo) catalog full file contents—creating a forensic record independent of E2E.

    LEAKAGE PATHWAYS:
    1. Direct search (Spotlight/Finder)
    2. API access (mdfind/Core Spotlight)
    3. System intelligence uplink

    REMEDIATION:
    • macOS: Spotlight Privacy + index rebuild
    • Windows: Indexing Options
    • Linux: .trackerignore (GNOME) or balooctl6 purge (KDE)

    The indexer never sleeps.

    Full analysis: steelefortress.com/fortress-fe

    #InfoSec #Privacy #EndpointSecurity #E2EE

  7. 𝗠𝘆𝘁𝗵 𝗕𝘂𝘀𝘁𝗲𝗿 𝗪𝗲𝗱𝗻𝗲𝘀𝗱𝗮𝘆: "𝗜 𝗵𝗮𝘃𝗲 𝗮𝗻𝘁𝗶𝘃𝗶𝗿𝘂𝘀, 𝘀𝗼 𝗜'𝗺 𝗳𝘂𝗹𝗹𝘆 𝗽𝗿𝗼𝘁𝗲𝗰𝘁𝗲𝗱." 🛡️

    ​This is like saying a single lock on your front door means your entire house is secure. Antivirus software is absolutely essential—it's your first line of defense against known threats—but it's far from a complete cybersecurity strategy.

    ​Think of it like our Cyber Toddlers learning to walk. They need strong legs (antivirus), but they also need:

    1. ​Balance: (Regular patching and updates)
    2. ​Awareness: (Employee training to spot phishing)
    3. ​Guardrails: (MFA, strong passwords, proper firewall configs)
    4. ​A Safe Space: (Backup solutions, incident response plans)

    ​Relying solely on antivirus is dangerously incomplete. It's a foundational piece, but it's not the whole puzzle.

    ​What's one other security measure you prioritize beyond just antivirus? Share your wisdom! 👇

    #Antivirus #CybersecurityMyth #LayeredSecurity #CyberToddler #EndpointSecurity #BizSec

  8. Viele reden über Cyber-Resilienz – die Realität in den Netzen sagt etwas anderes: 39% der IT-Geräte laufen ohne aktive Endpoint-Protection, 77% der Unternehmensnetzwerke sind unzureichend segmentiert, 32,5% der Geräte operieren außerhalb der IT-Kontrolle, 26% der Linux- und 8% der Windows-Systeme sind veraltet und ungepatcht. #CyberSecurity #Risikomanagement #ITSecurity #EndpointSecurity #EDR #PatchManagement #Netzwerksegmentierung #ZeroTrust #PaloAlto

  9. Cyber criminals are increasingly bypassing traditional defenses through phishing attacks and malicious software that accesses application memory to extract passwords, session tokens and other sensitive data.

    Keeper Security is mitigating that risk with Keeper Forcefield, an advanced endpoint security product for Windows that protects sensitive applications and processes from unauthorized access.

    Learn more: bit.ly/47Zebyq.

    #KeeperSecurity #Cybersecurity #EndpointSecurity

  10. October is Cybersecurity Awareness Month! 🚨 New research shows a significant gap in security coverage for managed endpoints due to device diversity and hybrid work. IT teams must adapt to ensure robust protection. What strategies are you implementing to close this gap? #Cybersecurity #Privacy #EndpointSecurity

    Read more: short.steelefortress.com/3dl9he

  11. A critical flaw in Lanscope Endpoint Manager is being exploited right now—attackers are already in the wild. Curious how major organizations are shoring up defenses? Read on for actionable strategies to protect your network.

    thedefendopsdiaries.com/mitiga

    #endpointsecurity
    #patchmanagement
    #cyberthreats
    #zerotrust
    #incidentresponse

  12. Apple macht sich erneut über Windows-Sicherheit lustig – Neuer Werbespot zur CrowdStrike-BSOD-Panne
    Apple thematisiert die weitverbreitete CrowdStrike-BSOD-Störung in einem neuen Werbespot und rückt damit die Zuverlässig
    apfeltalk.de/magazin/news/appl
    #News #Sicherheit #Apple #Betriebssysteme #BSOD #CrowdStrike #EndpointSecurity #Falcon #Kernel #macs #Sicherheit #Werbung #Windows