
Joshua Kaina
Secure Transfer ExpertIn a chilling development for cybersecurity professionals, a once-trusted protective mechanism within Windows systems has been turned against its purpose, allowing malicious actors to disable critical security tools on a massive scale. Cybercriminals have found a way to exploit Windows Defender Application Control (WDAC) policies, originally
In an era where cyber threats evolve at an alarming pace, securing endpoints against sophisticated malware and multi-stage attacks has become a paramount concern for organizations worldwide. A groundbreaking development in this space has emerged with the recent independent evaluation of Aurora Endpoint Security, a solution that has demonstrated
In a world where election integrity faces constant scrutiny, the Philippines achieved a historic milestone during its May midterm elections by recording an unprecedented 82% voter turnout, representing over 57 million Filipinos, while successfully defending against thousands of cyberattacks. This remarkable achievement was underpinned by
Welcome to an in-depth conversation with Vernon Yai, a renowned data protection expert with extensive experience in privacy protection and data governance. With a career dedicated to risk management and pioneering innovative techniques to safeguard sensitive information, Vernon is uniquely positioned to shed light on the recent ransomware attack
In the ever-shifting cybersecurity landscape of today, Managed Service Providers (MSPs) stand as critical defenders of businesses against an onslaught of sophisticated digital threats targeting endpoints such as laptops, desktops, servers, and mobile devices. These endpoints often serve as the primary entry points for attackers, making robust
In an era where cybersecurity threats evolve at a relentless pace, a startling new technique has emerged that allows attackers to extract sensitive Windows credentials and secrets while slipping past the watchful eyes of most Endpoint Detection and Response (EDR) systems. Dubbed "Silent Harvest," this method represents a significant leap in