Tag: edr
-
Beyond the Spectacle RSAC 2026 and The 5 Layers of AI Security FireTail Blog
Tags: ai, attack, business, conference, control, cybersecurity, data, detection, edr, framework, LLM, strategy, technology, tool, vulnerability, vulnerability-managementMar 31, 2026 – Jeremy Snyder – If you were at RSA Conference last year, you probably remember the goats. Or the puppies. Or the miniature petting zoos. It was a year of “over-the-top” spectacle. A bit of a circus, if I’m being honest.Coming into RSAC 2026, the vibe shifted. The show floor was noticeably…
-
Windows Tools Abused to Kill AV Ahead of Ransomware Attacks
Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, making attacks faster, quieter, and harder to stop. Instead of dropping noisy custom malware upfront, modern operators chain trusted utilities to gain SYSTEM access, kill security processes, and then encrypt at scale. Because many of these…
-
8 steps CISOs can take to empower their teams
Once when we were rolling out a well-known EDR tool, I knew the settings weren’t tight enough, nor were the received updates applied fast enough. So I asked two people to own this, come up with suggestions for tightening the screws, and guarantee a successful rollout on multiple OSes in parallel. The phased approach took…
-
Seceon Wins Four InfoSec Awards at RSA 2026, Launches ADMP and SeraAI 2.0
Seceon has won four Global InfoSec Awards at RSA Conference 2026 and used the event to announce two new platform capabilities: ADMP (AI Agent Discovery, Monitoring, and real-time Protection) and SeraAI 2.0. The four award wins span MSSP enablement, critical infrastructure protection, AI/ML innovation, and unified XDR, making Seceon the only vendor to sweep four..…
-
Broadcom Introduces Symantec CBX, Unifying Symantec and Carbon Black Into a Single XDR Platform
Broadcom has introduced Symantec CBX (Carbon Black XDR), a cloud-based platform that unifies Symantec and Carbon Black technologies into a single extended detection and response solution. The announcement was made March 23 at RSAC 2026 in San Francisco. The platform targets organizations that face serious threats but don’t have the staffing or budget to run..…
-
Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a tool named HwAudKiller to blind security programs using the bring your own vulnerable driver (BYOVD) technique.”The campaign abuses Google Ads to serve rogue ScreenConnect ( First seen…
-
Sacumen Launches ConnectX, an AI Platform for Managing the Full Connector Lifecycle
Sacumen launched ConnectX at RSA Conference 2026 in San Francisco, bringing together connector development, validation, testing, monitoring, and support into a single AI-driven platform. The company is targeting cybersecurity product companies that spend significant engineering bandwidth keeping integrations alive across SIEM, SOAR, XDR, IAM, and dozens of other categories. The pitch is straightforward: integration maintenance..…
-
Defenseless Defenders: Exploring Endpoint Detection and Response (EDR) Inhibitors
Learn how adversaries are shifting from evasion to systematically dismantling endpoint defenses to eliminate visibility, enforcement, and response. Explore how modern EDR inhibition techniques abuse legitimate system features and vulnerable drivers to quietly degrade protections with minimal detection. Understand why this once-advanced tradecraft is now standard practice”, and how it creates a critical blind spot…
-
Tax Scam Google Ads Push BYOVD EDR Killer, Huntress Finds
Tax-themed Google Ads are being weaponized to deliver a BYOVD-based EDR killer, with Huntress linking a large-scale malvertising campaign to rogue ScreenConnect deployments and a vulnerable Huawei audio driver used to blind endpoint defenses before hands-on-keyboard activity. Sponsored Google Ads for queries such as “W2 tax form” and “W”‘9 Tax Forms 2026” led to realistic…
-
Tax Scam Google Ads Push BYOVD EDR Killer, Huntress Finds
Tax-themed Google Ads are being weaponized to deliver a BYOVD-based EDR killer, with Huntress linking a large-scale malvertising campaign to rogue ScreenConnect deployments and a vulnerable Huawei audio driver used to blind endpoint defenses before hands-on-keyboard activity. Sponsored Google Ads for queries such as “W2 tax form” and “W”‘9 Tax Forms 2026” led to realistic…
-
Behavioral XDR and threat intel nab North Korean fake IT worker within 10 days of hire
Key signs of NK-linked insider infiltration: SpiderLabs has found that these threat actors commonly operate from China rather than North Korea because the internet is more stable and they can employ VPN services to conceal their true geographic origin.Astrill VPN has the ability to bypass China’s Great Firewall and allows threat actors to tunnel traffic…
-
54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 35 vulnerable drivers.EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security…
-
That cheap KVM device could expose your network to remote compromise
Stealthy backdoors: A compromised KVM device can become a powerful backdoor in any environment. An attacker can inject keystrokes to execute commands or access UEFI settings to disable security features such as disk encryption and Secure Boot.Because the device operates outside the controlled system’s OS, endpoint detection tools and host firewalls cannot see it. These…
-
54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 34 vulnerable drivers.EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security…
-
Top 6 XDR Solutions Vendors in 2026
Tags: edrCompare the top XDR solutions and vendors for 2026 in this quick buyer’s guide. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/xdr-security-solutions/
-
EDR killers are now standard equipment in ransomware attacks
Ransomware attackers routinely deploy tools designed to disable endpoint detection and response software before launching encryptors. These tools, known as EDR killers, have … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/19/edr-killer-ransomware-attacks/
-
Top 8 Endpoint Detection Response (EDR) Solutions in 2026
Compare the top EDR solutions of 2026 to monitor, secure, and optimize your organization’s endpoints. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/edr-solutions/
-
How Cortex XDR BIOC Rules Could Become an Attack Surface
A new study focusing on Cortex XDR BIOC rules reveals that encrypted detection logic, designed to remain secure, can be decrypted and examined, creating new risks for organizations relying on endpoint detection technologies. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cortex-xdr-bioc-rules-security-risk/
-
ManageEngine expands Endpoint Central with EDR and secure access
ManageEngine has announced the expansion of its unified endpoint management and security (UEMS) platform, Endpoint Central, to include endpoint detection and response (EDR) … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/18/manageengine-endpoint-central-expansion/
-
Runtime: The new frontier of AI agent security
Tags: access, ai, automation, ceo, ciso, computer, container, control, crowdstrike, cybersecurity, data, detection, edr, endpoint, firewall, framework, incident response, jobs, monitoring, network, openai, risk, saas, technology, threat, tool, vulnerability, zero-dayWhat runtime monitoring looks like: Once an organization knows where its agents are, the question is what to watch for, and how.Elia Zaitsev, CTO of CrowdStrike, tells CSO that existing endpoint detection and response (EDR) tools already capture the kinds of behavior needed to track AI agents. They instrument operating systems like a flight data…
-
Researchers Uncover Ways to Decrypt Palo Alto Cortex XDR BIOC Rules for Evasion
Cybersecurity researchers have discovered a critical evasion technique in Palo Alto Networks’ Cortex XDR agent that allowed attackers to completely bypass behavioral detections. The research demonstrates how predefined Behavioral Indicators of Compromise (BIOC) rules, shipped encrypted by Palo Alto, could be decrypted and analyzed. By reverse-engineering these rules, analysts identified hardcoded global whitelists that provided…
-
ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of “yeah”¦ this is probably going to show up in real incidents sooner than we’d like.”The pattern this week feels familiar in…
-
Palo Alto Cortex XDR Broker Vulnerability Exposes Systems to Sensitive Information Theft and Modification
Palo Alto Networks has issued a security advisory regarding a newly discovered vulnerability in its Cortex XDR Broker Virtual Machine (VM). Tracked as CVE-2026-0231, this medium-severity flaw could allow a threat actor to access and modify sensitive system information. Because the Broker VM acts as a critical bridge between on-premises network assets and the cloud-based…
-
Palo Alto Cortex XDR Broker Vulnerability Exposes Systems to Sensitive Information Theft and Modification
Palo Alto Networks has issued a security advisory regarding a newly discovered vulnerability in its Cortex XDR Broker Virtual Machine (VM). Tracked as CVE-2026-0231, this medium-severity flaw could allow a threat actor to access and modify sensitive system information. Because the Broker VM acts as a critical bridge between on-premises network assets and the cloud-based…
-
BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations
Russian threat actors for more than a year have targeted HR and recruiting operations in a sophisticated phishing and infostealing campaign that includes a component, dubbed BlackSanta, that can shut down antivirus tools and EDR protections before deploying the malware that exfiltrates data, Aryaka researchers say. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/blacksanta-malware-shuts-down-protections-targets-hr-and-recruiting-operations/
-
BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign
BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/blacksanta-edr-killer-targets-hr/
-
HR Departments Targeted by Multi-Layered BlackSanta EDR Killer Malware
Threat actors are increasingly targeting human resources (HR) departments by disguising malware as job application documents. The attack begins with what appears to be a legitimate job application. HR professionals receive a resume hosted on a well-known cloud storage platform, making the file seem trustworthy. The candidate profile looks realistic and relevant to open positions,…
-
New ‘BlackSanta’ EDR killer spotted targeting HR departments
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-blacksanta-edr-killer-spotted-targeting-hr-departments/

