News
The good driver that's being exploited here is called "rwdrv.sys,' which is used for tuning software for Intel CPUs. Hackers ...
In a report published by security company GuidePoint Security, they’ve issued a warning that hackers can effectively bypass ...
Threat researchers at GuidePoint Security have uncovered Akira affiliates abusing legitimate Windows drivers in a previously ...
GuidePoint Security has discovered attackers exploiting legitimate drivers to gain access to a device. This is accomplished ...
Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security ...
GuidePoint Security, a cybersecurity solutions company, announced today the launch of its new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for ...
Through this partnership, Cequence Security will leverage GuidePoint’s federal expertise across sales and marketing, operations, engineering, and procurement to expand their federal ...
Through this partnership, GuidePoint Security's customers have the opportunity to further strengthen their customers' cyber resilience through password protection and end-user verification.
GuidePoint also doesn’t restrict itself to only partnering with startups that show the potential to become the next cybersecurity industry giant, he noted. “They might not become CrowdStrike.
HERNDON, Va., April 22, 2025 -- (BUSINESS WIRE)-- GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today new ...
GuidePoint’s unmatched expertise has enabled 40% of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk.
GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results