#EndPoint
Custom data collection in Microsoft Defender for Endpoint was just announced in the November release notes.

Documentation is already available

learn.microsoft.com/en-us/defend...

Predictive shielding sounds also very interesting...
#MDE #XDR
November 18, 2025 at 7:11 PM
@thdxr https://x.com/thdxr/status/1990850077003247881 #x-thdxr

another example of overly early standardization - this whole openai compat endpoint

seemed like a good idea but of course models diverged in how they need data sent to them

and this requires things ...
November 18, 2025 at 6:45 PM
The bay area needs to get cheaper so the weirdos can come back. We also need brand new weirdos. More weirdos please
November 18, 2025 at 6:17 PM
"We have to win elections forever." Yes? That's actually the nature of history, which has no endpoint and requires ongoing vigilance from every generation? Permanent utopia ain't coming, so we might as well get used to it.
November 18, 2025 at 5:47 PM
Game changer for security teams! Windows 11 and Server 2025 will have Sysmon built-in, giving you detailed endpoint visibility without the deployment hassle. A huge step for threat hunting. Read More
November 18, 2025 at 5:38 PM
CVE-2025-63800 - Open Source Point of Sale Empty Password Vulnerability (Authentication Bypass)
CVE ID : CVE-2025-63800

Published : Nov. 18, 2025, 4:15 p.m. | 49 minutes ago

Description : The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set...
CVE-2025-63800 - Open Source Point of Sale Empty Password Vulnerability (Authentication Bypass)
The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. When an authenticated user omits or leaves the `password` and `repeat_password` parameters empty in the password change request, the backend still returns a …
cvefeed.io
November 18, 2025 at 5:09 PM
Η Microsoft ανακοίνωσε ότι το Azure απέκρουσε την μεγαλύτερη επίθεση botnet στην ιστορία, με πάνω από 500.000 συσκευές να στέλνουν έως 15,72 terabits ανά δευτερόλεπτο σε ένα μεμονωμένο cloud endpoint στ... www.insomnia.gr/articles/mic...
Η Microsoft απέκρουσε την μεγαλύτερη επίθεση DDoS στην ιστορία με 15,72 Tbps/sec
Πάνω από 500.000 συσκευές χρησιμοποιήθηκαν στην μεγαλύτερη DDoS επίθεση
www.insomnia.gr
November 18, 2025 at 5:08 PM
I like this, yes, fully onboard. And yeah let’s please not make Lennie’s world or Tenement the endpoint 😂😭 Hrmm… magic tree is kinda only btwn our world and Miterios (magic world) atm, but for this, I could have a brainy character start working on some new connections.
November 18, 2025 at 5:02 PM
NEWS FROM INDUSTRY
UPDATE: lidERA Trial In #BreastCancer
Source: Roche

www.roche.com/media/releas...

Roche announced that its phase III lidERA study of the investigational SERD giredestrant in ER-positive, HER2-negative early-stage breast cancer met its primary endpoint at an interim analysis
November 18, 2025 at 5:02 PM
"Imagine websites all becoming MCP endpoints, and the webpage and site map don't matter. What matters is the MCP endpoint that basically says, 'Come to me and ask me what you want to know or tell me what you want to do.'" www.techtarget.com/searchenterp... via @techtargetnews #search #AI #browse
Time to promote AI agents from "assistants to associates"? | TechTarget
Discover the newest developments in AI and learn about the growth of AI agents from experts at EmTech MIT 2025.
www.techtarget.com
November 18, 2025 at 4:45 PM
I feel like the endpoint of this line of reasoning is an exile colony. Everyone who shouldn't be allowed in society just gets sent to an island somewhere to live among their compatriots. Still not perfect but much better than a traditional prison IMO.
November 18, 2025 at 3:58 PM
Article:
Microsoft's Azure has mitigated the largest botnet attack in history, with over 500,000 devices used to send up to 15.72 terabits per second to a single cloud endpoint in Australia, which is roughly equivalent to 3.5 million Netflix movies streamed simultaneously per-second.
Microsoft Azure Blocks Largest DDoS Attack in History — attack equivalent to streaming 3.5 million Netflix movies at once, 15.72 Terabits per Second from 500,000 IP addresses tied to IoT botnet
Attack from botnet hit Azure with over 3.6 million packets per-second
www.tomshardware.com
November 18, 2025 at 3:47 PM
One of my workstations is still on W10.

That falls under the "not my f*#king job" category. 🤣🤣🤣

I have the image, the endpoint team sent it to me. Lol. Like, again, NOT, MY, JOB. LOL
November 18, 2025 at 3:09 PM
Epstein's Putin backchannel pitch wasn't "weird"—it was the logical endpoint of Trumpworld's compromised governance.

Emails show Epstein, a sex offender, offered Bannon Putin access during Mueller's probe, acting as Trump's shadow diplomat.
November 18, 2025 at 2:40 PM
Fwiw they still have an internal API endpoint that connects to the lava lamps but they don't really use it these days. It is fun to joke about though.
November 18, 2025 at 2:21 PM
Azure has blocked its largest DDoS attack to date, a 15.72 Tbps strike linked to the Aisuru IoT botnet that also surged to nearly 3.64 billion packets per second and targeted a single cloud endpoint in Australia, Microsoft said.

www.csoonline.com/article/4091...
Azure blocks record 15 Tbps DDoS attack as IoT botnets gain new firepower
Microsoft says the attack, sourced from more than 500,000 compromised IPs, exposes deep weaknesses in home IoT and raises questions about enterprise DDoS readiness.
www.csoonline.com
November 18, 2025 at 1:56 PM
DuckDB's website and extension installation endpoint are still intermittently down due to today's Cloudflare outage – see our status page for more details: status.duckdb.org

For a single-file PDF copy of our documentation, see our recent post.
DuckDB Status Page
status.duckdb.org
November 18, 2025 at 1:37 PM
I’ve been saying for years that him getting a righteous ass kicking at the right time in his life would’ve done wonders for our current world. He’s the logical endpoint of a life where no actions have real consequences ever.
November 18, 2025 at 1:33 PM
CVE-2025-41737 - Improper access control via php endpoint
CVE ID : CVE-2025-41737

Published : Nov. 18, 2025, 11:15 a.m. | 1 hour, 49 minutes ago

Description : Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules.
...
CVE-2025-41737 - Improper access control via php endpoint
Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules.
cvefeed.io
November 18, 2025 at 1:21 PM
It’s a pretty natural endpoint for these guys
November 18, 2025 at 1:14 PM
🖥️ Endpoint monitoring = stronger security.

🛡️ Spot threats early
⚙️ Track device health
🚨 Get instant alerts
🔄 Auto-isolate issues

CommPath keeps every device protected.

#TechTipTuesday #CyberSecurity #CommPath #ManagedIT
November 18, 2025 at 1:00 PM
RondoDox botnet malware targets unpatched XWiki servers exploiting CVE-2025-24893 (CVSS 9.8), allowing arbitrary code execution via the "/bin/get/Main/SolrSearch" endpoint. The vulnerability was patched in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1 in February 2025.
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
thehackernews.com
November 18, 2025 at 12:36 PM
MERCK’S WINREVAIR™ (SOTATERCEPT-CSRK) MET PRIMARY ENDPOINT IN PHASE 2 CADENCE STUDY IN ADULTS WITH COMBINED POST- AND PRECAPILLARY PULMONARY HYPERTENSION (CPCPH) DUE TO HEART FAILURE WITH PRESERVED EJECTION FRACTION (HFPEF) || WINREVAIR SHOWS SIGNIFICANT REDUCTION IN PULMONARY
November 18, 2025 at 12:07 PM
CrowdStrike Named an Inaugural Google Unified Security Recommended Partner Google Cloud Security selects CrowdStrike as an inaugural partner for unifying endpoint, identity, cloud, and data protect...

#Cyber #Security

Origin | Interest | Match
CrowdStrike Named an Inaugural Google Unified Security Recommended Partner
_**Google Cloud Security selects CrowdStrike as an inaugural partner for unifying endpoint, identity, cloud, and data protection across hybrid and multi-cloud environments**_ CrowdStrike (NASDAQ: CRWD) today announced that it was named one of three inaugural partners in the Google Unified Security Recommended program, recognizing the AI-native CrowdStrike Falcon® platform for endpoint protection. CrowdStrike is the only inaugural endpoint technology selected by Google for the Unified Security Recommended program. The Recommended program recognizes the breadth and depth of Google Cloud-validated integrations between the Falcon platform, Google Security Operations, Google Threat Intelligence, and Chrome Enterprise that enable customers to detect, investigate, and respond to threats faster. The collaboration also supports integrations that secure the AI lifecycle – and extends through the Model Context Protocol (MCP) to advance AI for security operations. Together, CrowdStrike and Google Cloud deliver unified protection across endpoint, identity, cloud, and data across hybrid and multi-cloud environments, accelerating the market’s shift to consolidate security investments onto a single, AI-powered cybersecurity platform. CrowdStrike and Google Cloud continue to innovate to help organizations stop breaches and secure innovation in the cloud. Customers benefit from Mandiant Incident Response and Mandiant Threat Defense services with the Falcon platform and Google Cloud Security Operations, along with joint integrations that enable end-to-end security for AI innovation. “CrowdStrike pioneered modern endpoint protection and built the cybersecurity platform trusted by the world’s leading organizations and hyperscalers,” said Daniel Bernard, chief business officer, CrowdStrike. “Google Cloud’s recognition reinforces CrowdStrike’s market leadership in endpoint, delivering the outcome of stopping breaches. The AI era demands collaboration across an open ecosystem, and together with Google Cloud we’re delivering the speed, intelligence, and trust organizations need.” “Through the Google Unified Security Recommended program, we’re partnering with trusted leaders like CrowdStrike to help customers strengthen their defenses with unified, AI-driven protection,” said Chris Corde, senior director of product management, Google Cloud. “CrowdStrike’s integrations with Google Cloud products and services and commitment to open innovation exemplify what this program was built for – helping enterprises achieve better security outcomes and protect every environment from endpoint to cloud.” CrowdStrike and Google Cloud are helping to redefine how organizations secure the cloud – advancing an open future for security and delivering unified protection for joint customers. For more information on the CrowdStrike-Google Cloud partnership, visit here. **Business Wire** Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented NX Network. Business Wire has 18 newsrooms worldwide to meet the needs of communications professionals and news media. __
ai-techpark.com
November 18, 2025 at 12:26 PM
A sandbox is a isolated environment for detonating malware. You give a suspicious email attachment to the sandbox to see what it really does before it reaches an endpoint.
November 18, 2025 at 11:15 AM