Cynet, the world’s first provider of an autonomous, all-in-one cybersecurity platform, today announced Cynet 360 Mobile, a comprehensive mobile threat protection solution that provides persistent, on-device protection of company and user-owned mobile devices. Cynet 360 Mobile prevents security and privacy threats to Chrome OS, Android and iOS devices, and detects applications that put data at risk of exposure and attempt to infiltrate corporate networks. By leveraging on-device behavioral machine learning detection, Cynet 360 Mobile protects against both known and unknown (0-day) threats, such as mobile malware, phishing, man-in-the-middle (MitM), and network-based attacks.
The need to protect against mobile threats has never been more urgent. According to the 2022 Verizon Mobile Security Index, 91% of organizations say mobile devices are critical to their operations. But because mobile devices provide access to the same content and services as traditional endpoints–and often serve as an authentication tool–they are highly vulnerable to cybersecurity threats and attackers. In fact, according to Verizon’s research, nearly half (46%) of SMBs reported experiencing a compromise that involved a mobile device.
Cynet 360 Mobile provides protection capabilities beyond standard mobile device management (MDM) solutions that only manage devices but fail to detect threats or offer any comprehensive security protections. With Cynet 360 Mobile, businesses gain complete visibility and protection across endpoints, mobile devices, networks and users within SaaS and Cloud environments. It can be deployed as a standalone capability on mobile devices or implemented alongside existing MDM solutions to add an extra layer of protection to fight dangerous threats.
Visit https://www.cynet.com to learn more.
Cynet Takes A Look At CVE-2023-36884
Posted in Commentary with tags Cynet on July 14, 2023 by itnerdThe research team at Cynet has been taking a look at CVE-2023-36884 which relates to a Microsoft Office and Windows HTML Remote Code Execution Vulnerability. The blog breaks down the specifics of the attack vectors and how the Storm group who are the threat actors behind this carries out the attack.
You can read the blog post here: https://www.cynet.com/blog/yet-another-ms-cve-dont-get-caught-in-the-storm/
Leave a comment »