Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Simple Steps for Attack Surface Reduction

Posted on August 14, 2025August 14, 2025 By CWS

Aug 14, 2025The Hacker NewsEndpoint Safety / Software Safety
Story teaser textual content: Cybersecurity leaders face mounting stress to cease assaults earlier than they begin, and one of the best protection could come right down to the settings you select on day one. On this piece, Yuriy Tsibere explores how default insurance policies like deny-by-default, MFA enforcement, and utility Ringfencing ™ can remove total classes of danger. From disabling Workplace macros to blocking outbound server visitors, these easy however strategic strikes create a hardened surroundings that attackers cannot simply penetrate. Whether or not you are securing endpoints or overseeing coverage rollouts, adopting a security-by-default mindset can cut back complexity, shrink your assault floor, and assist you keep forward of evolving threats.
Cybersecurity has modified dramatically because the days of the “Love Bug” virus in 2001. What was as soon as an annoyance is now a profit-driven prison enterprise price billions. This shift calls for proactive protection methods that do not simply reply to threats—they stop them from ever reaching your community. CISOs, IT admins, and MSPs want options that block assaults by default, not simply detect them after the very fact. Trade frameworks like NIST, ISO, CIS, and HIPAA present steerage, however they typically lack the clear, actionable steps wanted to implement efficient safety.
For anybody beginning a brand new safety management function, the mission is evident: Cease as many assaults as attainable, frustrate menace actors, and do it with out alienating the IT crew. That is the place a security-by-default mindset is available in—configuring methods to dam dangers out of the gate. As I’ve typically mentioned, the attackers solely need to be proper as soon as. We’ve got to be proper 100% of the time.
This is how setting the suitable defaults can remove total classes of danger.
Require multi-factor authentication (MFA) on all distant accounts
Enabling MFA throughout all distant providers—together with SaaS platforms like Workplace 365 and G Suite, in addition to area registrars and distant entry instruments—is a foundational safety default. Even when a password is compromised, MFA can stop unauthorized entry. Attempt to keep away from utilizing textual content messages for MFA as it may be intercepted.
Whereas it might introduce some friction, the safety advantages far outweigh the chance of information theft or monetary loss.

Deny-by-default
One of the efficient safety measures these days is utility whitelisting or allowlisting. This method blocks all the pieces by default and solely permits identified, authorized software program to run. The consequence: Ransomware and different malicious functions are stopped earlier than they will execute. It additionally blocks legitimate-but-unauthorized distant instruments like AnyDesk or comparable, which attackers typically attempt to sneak in by way of social engineering.
Customers can nonetheless entry what they want by way of a pre-approved retailer of protected functions, and visibility instruments make it simple to trace all the pieces that runs—together with transportable apps.
Fast wins by way of safe configuration
Small adjustments to default settings can shut main safety gaps on Home windows and different platforms:

Flip off Workplace macros: It takes 5 minutes and blocks some of the widespread assault vectors for ransomware.
Use password-protected screensavers: Auto-lock your display after a brief break to cease anybody from snooping round.
Disable SMBv1: This old-school protocol is outdated and has been utilized in large assaults like WannaCry. Most methods do not want it anymore.
Flip off the Home windows keylogger: It is not often helpful and could possibly be a safety danger if left on.

Management community and utility habits for organizations

Take away native admin rights: Most malware would not want admin entry to run, however taking it away stops customers from messing with safety settings and even putting in malicious software program.
Block unused ports and restrict outbound visitors:

Shut down SMB and RDP ports except completely obligatory—and solely enable trusted sources.
Cease servers from reaching the web except they should. This helps keep away from assaults like SolarWinds.

Management utility behaviors: Instruments like ThreatLocker Ringfencing ™ can cease apps from doing sketchy issues—like Phrase launching PowerShell (sure, that is an actual assault methodology).
Safe your VPN: In the event you do not want it, flip it off. In the event you do, restrict entry to particular IPs and prohibit what customers can entry.

Strengthen information and internet controls

Block USB drives by default: They are a widespread approach for malware to unfold. Solely enable safe managed, encrypted ones if wanted.
Restrict file entry: Apps should not have the ability to poke round in person recordsdata except they really want to.
Filter out unapproved instruments: Block random SaaS or cloud apps that have not been vetted. Let customers request entry in the event that they want one thing.
Observe file exercise: Keep watch over who’s doing what with recordsdata—each on gadgets and within the cloud. It is key for recognizing shady habits.

Transcend defaults with monitoring and patching
Sturdy defaults are just the start. Ongoing vigilance is important:

Common patching: Most assaults use identified bugs. Hold all the pieces up to date—together with transportable apps.
Automated menace detection: EDR instruments are nice, but when nobody’s watching alerts 24/7, threats can slip by way of. MDR providers can soar in quick, even after hours.

Safety by default is not simply sensible, it is non-negotiable. Blocking unknown apps, utilizing sturdy authentication, locking down networks and app habits can wipe out a ton of danger. Attackers solely want one shot, however stable default settings preserve your defenses prepared on a regular basis. The payoff? Fewer breaches, much less problem, and a stronger, extra resilient setup.Word: This text is expertly written and contributed by Yuriy Tsibere, Product Supervisor and Enterprise Analyst at ThreatLocker.

Discovered this text fascinating? This text is a contributed piece from certainly one of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Attack, Reduction, Simple, Steps, Surface

Post navigation

Previous Post: Passkey Login Bypassed via WebAuthn Process Manipulation
Next Post: New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits

Related Posts

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News
VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More The Hacker News
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code The Hacker News
Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities
  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities
  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News