Source |
CSO |
Identifiant |
5054988 |
Date de publication |
2022-06-09 03:40:00 (vue: 2022-06-09 11:05:07) |
Titre |
ConcealBrowse isolates malicious software before it can work its mischief |
Texte |
More threat actors are exploiting the browser as an attack vector, largely because it's becoming a popular way to access corporate applications and resources. As a means to counter browser-borne malicious software-such as Trojans, worms or ransomware-Conceal, an endpoint security company, introduced this week ConcealBrowse.ConcealBrowse, which supports all popular operating systems, can be planted on an endpoint by a network administrator where it will monitor all code as it runs to determine if it presents a threat to an organization. Suspicious content is run in isolation where, if the software is malicious, any damage it might cause can be contained.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
access actors administrator all any applications are article attack because becoming before borne browser can cause click code company conceal concealbrowse contained content corporate counter damage determine endpoint exploiting full here introduced isolates isolation its largely malicious means might mischief monitor more network operating organization planted please popular presents ransomware read resources run runs security software such supports suspicious systems threat trojans vector way week where which will work worms |
Tags |
Threat
|
Stories |
|
Notes |
|
Move |
|