AppGuard Blog

Posted on Feb 11, 2022

Based on ITRC’s annual 2021 data breach report, one should choose improvements in endpoint protection over other cybersecurity choices for 2022 should do more to improve malware risk mitigation and decrease IT/Sec-Ops costs. We believe the best way to achieve this is by filling detection gaps with zero trust WITHIN endpoints.

Read More ›

Posted on Jan 3, 2022

After about five seconds, the adversary has total undetectable, remote control of the targeted host. AvosLocker Ransomware manipulates and triggers Windows Safe Mode to evade detection defenses. AppGuard, a protection tool applying zero trust principles within endpoints, prevents it from getting this far.

Read More ›

The CVE-2021-44228 vulnerability reported in an Apache library known as “Log4j” affects numerous products and cloud services across the Internet that leverage Apache. Organizations with vulnerable servers can be confident that AppGuard can help protect them from the effects of ensuing attacks.

Read More ›
Cybersecurity Enterprise Zero Trust

Posted on Nov 10, 2021

AppGuard joined its partner Cipher at the FinCyber Today event on 3 November 2021. Cipher delivered an informative demo of how to detect, stop and respond to a cyberattack. Overall, the conference featured prominent subject matter experts in cybersecurity sharing insights and recommendations with attendees.

Read More ›
Cybersecurity Enterprise Server Zero Trust

Posted on Oct 4, 2021

Zero-day attacks, breaches due to missing patches, weaponized documents, drive-by downloads, and some code injections are examples of AppJacking. Read about the AppJacking concepts to understand better ways to mitigate these risks using Zero Trust principles within endpoints.

Read More ›
Cybersecurity Enterprise Server Zero Trust

Posted on Sep 28, 2021

The files within your endpoint folders can hurt you. Enterprises need to supplement their detection-based defenses with tools that do not have to recognize malicious files to defeat them. This blog strives to explain to executives what their technical people need them to understand about other layers of protection that can mitigate these risks.

Read More ›

Living off the land (LOL) malware attack techniques use legitimate operating system (OS) utilities already on targeted hosts to breach enterprises. This blog post provides non-technical folk an introduction to this challenge, including high-level pros and cons of some remedies.

Read More ›
Cybersecurity Enterprise

Posted on Aug 17, 2021

Over reliance on detection technologies for mitigating malware risks negatively taxes enterprises in two ways: successful malware attacks and higher cyber operations costs. Here we look qualitatively at cyber operations costs to help answer the question: what would be alleviated if far more malware attacks were neutralized at the endpoint in real-time by adding non-detection protection capabilities.

Read More ›
Cybersecurity Enterprise

Posted on Jul 14, 2021

Industry analysts say that enterprises rely solely or mostly on detection-based cyber defense technologies. Their reports also demonstrate why detection-based tools alone are not enough. This blog focuses explains why detection is missing the mark. It concludes with a brief introduction of what the enterprise needs and the steps to get it.

Read More ›
Cybersecurity Enterprise

Posted on Jul 6, 2021

From the vendor: “Kaseya’s VSA product has unfortunately been the victim of a sophisticated cyberattack.” Hackers believed to be associated with the Russian threat group known as “REvil” exploited a SQL vulnerability and an authentication bypass to hijack the on-premise deployments of Kaseya VSA.

Read More ›

Topics

Subscribe

Subscribe to our blog to receive email notifications when new posts are added!

Loading