endpoint protection

Winsage
June 30, 2025
Microsoft has announced that Windows 11 25H2 is forthcoming, serving as a feature enablement update rather than a complete overhaul, sharing the same underlying source code as Windows 11 24H2. Windows Insiders have already gained early access to 25H2, which will introduce additional features activated through an enablement package. Jason Leznek, Principal Project Manager for Windows Servicing and Delivery, noted the seamless compatibility between the two versions, advising a focus on new features rather than a comprehensive review of the operating system. Windows 11 24H2 has faced various issues since its release in 2024, leading to compatibility holds from Microsoft. A significant change in Windows 11 25H2 includes the retirement of the Blue Screen of Death (BSoD), which will be replaced by a black "unexpected restart" screen, while still allowing users to view the stop error code. Microsoft is also introducing quick recovery options for PCs that have trouble restarting and enhancing its security framework by allowing antivirus and endpoint protection vendors to operate in user mode outside of the Windows kernel. The BSoD replacement is expected to roll out on Windows 11 24H2 devices over the summer and will be a key feature of Windows 11 25H2. Additionally, the Windows endpoint security platform will enter private preview in July.
Winsage
June 27, 2025
Microsoft will retire the Windows Blue Screen of Death (BSOD) in favor of a black screen as part of the Windows Resiliency Initiative (WRI), with the change rolling out later this summer for Windows 11 version 24H2 devices. This update follows a security incident in July 2024 that affected approximately 8.5 million Windows machines. The WRI aims to enhance system resilience by reengineering Windows code and allowing security software to operate outside the Windows kernel, minimizing risks from vendor security code. A private preview of the new Windows endpoint security platform will be available to Microsoft Virus Initiative partners next month.
Winsage
June 26, 2025
Resilience is now a strategic necessity for organizations, prompting Microsoft to launch the Windows Resiliency Initiative (WRI) to integrate resilience and security into the Windows platform. In September 2024, Microsoft held the Windows Endpoint Security Ecosystem Summit (WESES) with endpoint security vendors and government representatives to discuss enhancing resilience. Following the summit, collaboration with Microsoft Virus Initiative (MVI) partners has increased, focusing on improving Windows security and reliability through rigorous testing and safe deployment practices. Next month, Microsoft will begin a private preview of a new Windows endpoint security platform for select MVI partners, allowing security solutions to operate outside the Windows kernel for better reliability. Microsoft has released the Windows Resiliency Initiative e-book to guide organizations in building resilience. Innovative products introduced under the WRI include: - Quick machine recovery (QMR) for faster recovery from unexpected restarts, reducing downtime to approximately two seconds. - Microsoft Connected Cache to enhance bandwidth efficiency during updates by caching content locally. - Universal Print anywhere for secure printing from any location. - Hotpatch updates for critical security updates without requiring a restart. - Windows 365 Reserve for secure access to a temporary Cloud PC during device disruptions.
Winsage
June 26, 2025
David Weston, Microsoft’s Corporate Vice President of Enterprise and OS Security, stated that Microsoft is preparing to enhance the resilience and security of its Windows operating system. The company will offer limited access to a Windows endpoint security platform for third-party vendors as part of its Microsoft Virus Initiative (MVI), aimed at improving safe deployment practices. The platform will enter a private preview phase in July for select MVI partners, allowing them to provide feedback. Key features include collaboration with third-party vendors, services running outside the Windows kernel, and development driven by partner feedback. The Windows endpoint security platform will enable partners to develop products that operate in user mode, preventing disruptions like the previous CrowdStrike incident. Weston emphasized the importance of customer trust and transparency in the development process. Microsoft is also introducing a simplified user interface and a quick machine recovery service for Windows 11 version 24H2, along with a Connected Cache service launching on July 9 to enhance bandwidth efficiency. Support for Microsoft’s initiatives has come from various third-party security vendors involved in the MVI, with positive feedback from Microsoft solution providers regarding enhanced protection against third-party software issues.
Winsage
June 26, 2025
Last summer's CrowdStrike incident caused significant disruptions in healthcare, banking, and air travel, resulting in billions of dollars in damages. In response, Microsoft held a security summit with experts from CrowdStrike and other firms to address vulnerabilities. Microsoft announced Safe Deployment practices and architectural changes to enhance Windows security, including relocating third-party security drivers from the Windows kernel to user space. This change aims to reduce risks associated with kernel-level flaws. Upcoming features in Windows 11 24H2 include a streamlined crash report process, replacing the Blue Screen of Death with an "unexpected restart" screen, and a quick machine recovery (QMR) capability to automate fixes during outages. Additionally, Windows Autopatch will allow network administrators to deploy updates with fewer required restarts for Windows 11 Enterprise PCs, limiting them to once every three months.
Tech Optimizer
June 23, 2025
A diverse array of endpoint security tools has been integral to cyber defense strategies for desktops, laptops, and other end-user devices for the past three decades. The latest evolution is represented by endpoint protection platforms (EPPs), which combine various security capabilities including antivirus software, visibility and monitoring, and endpoint detection and response (EDR). EPPs continuously log, monitor, and analyze events on endpoints to identify suspicious activities, generate alerts, and neutralize threats. They serve as a frontline defense for devices such as desktops, laptops, smartphones, tablets, IoT devices, and other user-facing technologies. Leading EPP solutions include the SentinelOne Singularity Platform and CrowdStrike Falcon. Both platforms offer automation capabilities that generate alerts upon detecting events and can act in real-time to thwart attacks. They provide centralized dashboards and reporting features for analysts and incorporate generative AI threat detection interfaces. The EPPs are compatible with various operating systems, including Windows, Linux, macOS, ChromeOS, Android, and iOS. Pricing for SentinelOne includes: - Singularity Complete: .99 per device annually. - Singularity Commercial: .99 per device per year. - Singularity Enterprise: Pricing available upon request. CrowdStrike pricing options include: - Falcon Go: [openai_gpt model="gpt-4o-mini" prompt="Summarize the content and extract only the fact described in the text bellow. The summary shall NOT include a title, introduction and conclusion. Text: A diverse array of endpoint security tools has been integral to cyber defense strategies for desktops, laptops, and other end-user devices for the past three decades. The latest evolution in this realm is represented by endpoint protection platforms (EPPs), which amalgamate various security capabilities including antivirus software, visibility and monitoring, as well as endpoint detection and response (EDR). These platforms continuously log, monitor, and analyze events on endpoints to identify suspicious activities, generate alerts, and, when necessary, neutralize threats. EPPs serve as a frontline defense for a range of devices such as desktops, laptops, smartphones, tablets, IoT devices, and other user-facing technologies. Among the leading EPP solutions available today are the SentinelOne Singularity Platform and CrowdStrike Falcon. A closer examination reveals a comparison of their key features, pricing structures, and performance metrics, along with guidance for organizations seeking an EPP that aligns with their security needs. Key features comparison Both Singularity and Falcon offer a robust suite of capabilities: Automation capabilities. Both platforms automatically generate alerts upon detecting events that warrant further investigation. They can act in real-time to thwart attacks, with options for automated responses such as remediation and rollback when malicious activities are identified. Additionally, human analysts have the flexibility to manually initiate these responses through the platforms. Analyst interface. Each EPP provides centralized dashboards and reporting features that analysts utilize to review correlated event data. Furthermore, both platforms incorporate generative AI (GenAI) threat detection interfaces—Purple AI for SentinelOne and Charlotte AI for CrowdStrike—allowing administrators to query the GenAI agent for deeper insights into the analyzed event data. Supported OSes. The EPPs are compatible with various operating systems, including Windows, Linux, macOS, ChromeOS, Android, and iOS. Cybersecurity platform. These platforms feature centralized storage, dashboards, and analytical capabilities for the data generated by their offerings, alongside other cybersecurity and asset information. Pricing comparison As the tools diverge in their offerings, pricing becomes a distinguishing factor, with each platform presenting unique features and add-ons. SentinelOne Singularity pricing options Singularity Complete is priced at 9.99 per device annually, providing endpoint and cloud workload protection. Singularity Commercial costs 9.99 per device per year, encompassing XDR, EPP, EDR capabilities, identity threat detection and response (ITDR), and managed threat hunting (WatchTower). Singularity Enterprise includes comprehensive features such as XDR, EPP, EDR, data retention, ITDR, threat hunting, network discovery (Singularity Network Discovery), forensic data collection (Singularity RemoteOps Forensics), and support services. Pricing is available upon request from SentinelOne. CrowdStrike Falcon pricing options Falcon Go, available at .99 per device per year for up to 100 devices, includes antivirus software (Falcon Prevent), USB device control (Falcon Device Control), mobile device protection (Falcon for Mobile), and support services. Falcon Pro is priced at .99 per device per year, offering Falcon Prevent, Falcon Device Control, host firewall control (Falcon Firewall Management), and support services. Falcon Enterprise costs 4.99 per device annually, featuring Falcon Prevent, Falcon Device Control, Falcon Firewall Management, threat hunting and intelligence (Falcon OverWatch), extended detection and response (Falcon Insight XDR), and support services. Falcon Complete MDR represents CrowdStrike's managed detection and response service, which includes Falcon Prevent, Falcon OverWatch, Falcon Insight XDR, and IT hygiene (Falcon Discover), with options to add firewall and identity protection. Pricing for Complete MDR is available upon inquiry. Additionally, Falcon for Mobile protection for smartphones and tablets can be acquired as a separate add-on for Pro, Enterprise, and Complete MDR plans. Performance and evaluation comparison Feedback from users regarding SentinelOne and CrowdStrike offerings tends to align positively. Verified reviews on Gartner Peer Insights indicate that both EPPs boast an average performance rating of 4.7 out of 5, with 99% of ratings being three stars or higher. In the past year, CrowdStrike's Falcon garnered 724 ratings, while SentinelOne's Singularity received 227. SentinelOne holds a slight edge over CrowdStrike in terms of pricing flexibility, rated at 4.4 compared to 4.2, whereas CrowdStrike excels in the availability of third-party resources, rated at 4.7 against SentinelOne's 4.4. Notably, both platforms were included in the 2023 Mitre ATT&CK Evaluations, which simulated a nation-state attack scenario. In this evaluation, CrowdStrike demonstrated superior attack technique detection, while both platforms exhibited comparable protection capabilities. In the 2024 evaluations, CrowdStrike opted out, allowing SentinelOne to successfully detect all tested attack techniques. Common criticisms of CrowdStrike on Gartner Peer Insights highlight complexities in licensing and insufficient support for hybrid environments. Conversely, SentinelOne users expressed frustration with the Android OS capabilities, which tend to generate a higher number of false positives. Questions to ask when selecting an EPP tool Organizations of all sizes should implement endpoint security tools to safeguard their user devices. Larger enterprises often manage and monitor these tools internally, while smaller organizations may opt for managed services that provide similar endpoint security solutions along with management and monitoring support. Some services even offer incident response capabilities in conjunction with the organization's existing resources. When evaluating endpoint security tools and services, organizations should consider the following questions: How well integrated is the platform? Is there a single agent deployed to each endpoint, or is it a combination of agents? Does the product represent a truly unified platform or merely a collection of services presented under a unified interface? What is the quality of the platform's data gathering, logging, analysis, alerting, and alert prioritization in terms of accuracy, speed, and comprehensiveness? High quality should be the cornerstone of any EPP. How effectively does the platform leverage cyber threat intelligence? What sources does it utilize, and how frequently are they updated? What techniques does the platform employ to analyze events and detect attacks? How adept is it at identifying sophisticated and novel threats? How automated are its capabilities? This encompasses protection, detection, and incident response features. Effective automation that makes sound decisions in real-time can be pivotal in preventing ransomware from affecting multiple endpoints. Karen Scarfone is the principal consultant at Scarfone Cybersecurity in Clifton, Va. She provides cybersecurity publication consulting to organizations and was formerly a senior computer scientist for NIST." max_tokens="3500" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" frequency_penalty="frequency_penalty"].99 per device per year for up to 100 devices. - Falcon Pro: .99 per device per year. - Falcon Enterprise: .99 per device annually. - Falcon Complete MDR: Pricing available upon inquiry. User feedback indicates both EPPs have an average performance rating of 4.7 out of 5, with 99% of ratings being three stars or higher. CrowdStrike's Falcon received 724 ratings, while SentinelOne's Singularity received 227. SentinelOne has a slight edge in pricing flexibility (rated 4.4) compared to CrowdStrike (rated 4.2), while CrowdStrike excels in third-party resource availability (rated 4.7) compared to SentinelOne (rated 4.4). Both platforms were included in the 2023 Mitre ATT&CK Evaluations, with CrowdStrike demonstrating superior attack technique detection. Common criticisms of CrowdStrike include complexities in licensing and insufficient support for hybrid environments, while SentinelOne users expressed frustration with Android OS capabilities leading to higher false positives. Organizations should consider integration quality, data gathering and analysis capabilities, cyber threat intelligence utilization, attack detection techniques, and automation levels when selecting an EPP tool.
AppWizard
June 22, 2025
A significant security vulnerability has been discovered in Android's notification system, allowing malicious actors to exploit invisible Unicode characters to open deceptive links without user awareness. Research indicates that this flaw enables attackers to redirect users from seemingly legitimate links, such as "amazon.com," to malicious sites like "zon.com" through the use of zero-width space characters. Major applications including WhatsApp, Telegram, Instagram, Discord, and Slack have been confirmed as vulnerable to this exploit. Attackers can also use this vulnerability to initiate deep links that perform actions like making calls or sending messages without user consent. Traditional antivirus solutions may not detect these threats, as they do not involve conventional malware, highlighting the need for endpoint protection tools that focus on behavioral anomalies. Users are advised to be cautious with notifications and links from unfamiliar sources.
Tech Optimizer
June 14, 2025
A new browser-based malware campaign exploits trusted domains like Google.com to bypass traditional antivirus defenses. The malware operates through an e-commerce site using a manipulated Google OAuth logout URL, which executes an obfuscated JavaScript payload. This script activates silently during checkout or when the browser appears automated, opening a WebSocket connection to a malicious server. Payloads are dynamically executed using JavaScript, enhancing the threat's effectiveness. The attack evades detection by many antivirus programs due to its obfuscation and conditional activation. DNS filters and firewall rules offer limited protection since the initial request goes to a legitimate domain. Advanced users may use content inspection proxies or behavioral analysis tools to detect anomalies, but average users remain vulnerable. Recommendations to mitigate risks include limiting third-party scripts and maintaining separate browser sessions for financial transactions.
Tech Optimizer
June 5, 2025
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the FBI and the Australian Cyber Security Centre, released an advisory on the Play ransomware group, which has targeted around 900 entities since its inception in June 2022. The group employs a double extortion model, exploiting vulnerabilities in public-facing applications and using tools for lateral movement and credential dumping. Their operations involve recompiling ransomware binaries for each attack to evade detection. The advisory highlights mitigation measures such as multifactor authentication and regular software patching. The Play ransomware specifically targets virtual environments and encrypts files using AES-256 encryption. Indicators of Compromise (IoCs) include: - SVCHost.dll (Backdoor) - SHA-256: 47B7B2DD88959CD7224A5542AE8D5BCE928BFC986BF0D0321532A7515C244A1E - Backdoor - SHA-256: 75B525B220169F07AECFB3B1991702FBD9A1E170CAF0040D1FCB07C3E819F54A - PSexesvc.exe (Custom Play “psexesvc”) - SHA-256: 1409E010675BF4A40DB0A845B60DB3AAE5B302834E80ADEEC884AEBC55ECCBF7 - HRsword.exe (Disables endpoint protection) - SHA-256: 0E408AED1ACF902A9F97ABF71CF0DD354024109C5D52A79054C421BE35D93549 - Hi.exe (Associated with ransomware) - SHA-256: 6DE8DD5757F9A3AC5E2AC28E8A77682D7A29BE25C106F785A061DCF582A20DC6
Search