Building out a workflow to modify host groups
Hello everyone, I am reaching out to get everyone's opinion on using a soar workflow to go through and adjust device host groups based on the username column in Endpoint security -> files written to USB. I am trying to come up with a workaround for the host based policy enforcement. Let me know what you think. submitted by /u/Crypt0-n00b [link] [comments]
The Rise of BYOVD: Silver Fox Abuses Vulnerable Microsoft-Signed Drivers
Silver Fox exploits a Microsoft-signed WatchDog driver to bypass defenses and deploy ValleyRAT malware, exposing gaps in endpoint security.
Microsoft ranked number one in modern endpoint security market share third year in a row
For a third year a row, Microsoft has been named the number one leader for endpoint security market share, as featured in a new IDC report.
AI-Driven Trends in Endpoint Security: What the 2025 Gartner(R) Magic Quadrant(TM) Reveals
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an ever-evolving threat landscape.
Need some advice for the career path
Hello, I've been in the cybersecurity industry for 10 years. I've worked in cloud security, SIEM administration, vulnerability management, and endpoint security across many different sectors. I'm certified in Microsoft, AWS, and CEH. I've noticed that the industry's demand (and its decreasing demand) is now for specialists, and that generalists like me are no longer wanted. I chose cloud security as my primary specialization, but job opportunities in this field are relatively few. I'm...
Ransomware crews don't care about your endpoint security - they've already killed it
thereregister.com just posted a very interesting article about how ransomware crews evade EDRs. You can