Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. [Cybersecurity Insider] Thursday, July 13, 2023 Cybersecurity Insider is brought to you by eSecurity Planet and TechRepublic. Sponsored by: [Kolide Logo](   TODAY'S TOP STORY   [Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor]( Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. [Learn More]( [Watch the demo and see how Kolide works]( Kolide is a device trust solution for companies with Okta and ensures that if a device isn't trusted and secure, it can't log into your cloud apps. [Watch the demo and see how it works](. [Learn More](     TRENDING NOW   [Zero-Day Exploits: A Cheat Sheet for Professionals]( Zero-Day Exploits: A Cheat Sheet for Professionals]( This guide covers everything you need to know about zero-day security exploits, which are secret vulnerabilities used by hackers to infiltrate PCs, networks, mobile phones and IoT devices. [Learn More](   [Microsoft Patch Tuesday Addresses 130 Flaws – Including Unpatched RomCom Exploit]( [Microsoft Patch Tuesday Addresses 130 Flaws – Including Unpatched RomCom Exploit]( Microsoft’s Patch Tuesday for July 2023 includes nine critical flaws, and five are actively being exploited. Notably, one of those five remains unpatched at this point. [Learn More](   [UN AI for Good Summit Explores How Generative AI Poses Risks and Fosters Connections]( [UN AI for Good Summit Explores How Generative AI Poses Risks and Fosters Connections]( Panelists at the UN AI for Good summit discussed regulation, international cooperation and how lessons learned from social media could apply to artificial intelligence. [Learn More](   YOUR RECOMMENDED NEWSLETTER   [Subscribe to the TechRepublic UK Newsletter]( Stay up to date on the latest in technology with TechRepublic UK. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that are most relevant to UK markets that will help you stay ahead of the game. [Subscribe Now](   TECHREPUBLIC SHOP   [Brute Force and Dictionary Attacks: A Guide for IT Leaders]( Read this guide from TechRepublic Premium to find out what you need to know about this classic form of cybersecurity attack, how safe you may (or may not) be and how to defend your systems against brute force attacks. [Visit TechRepublic Premium](   [Protect Your Data With the MonoDefense Security Suite for $149.99]( Get VPN, Firewall and SmartDNS protection in one package! Combining five top-rated security apps, the MonoDefense Security Suite offers complete protection — and lifetime subscriptions are now 62% off. [Visit TechRepublic Academy](   WHAT'S NEW ACROSS OUR TECH UNIVERSE   Datamation   [The Ultimate Guide to Cloud Computing]( This ultimate guide explains everything you need to know about cloud computing, including how it works, the difference between public and private clouds, and the benefits and drawbacks of different cloud services. Enterprise Storage Forum   [Top 5 Data Loss Prevention Solutions for 2023]( Data loss prevention (DLP) tools help businesses protect one of their most valuable assets: information. Our picks for the top DLP tools provide best-in-class data protection capabilities. Enterprise Networking Planet   [18 Types of Network Security Solutions to Implement]( There is a wide array of network security solutions that protect against cyberthreats, including firewall software, access control tools, antivirus solutions, and intrusion detection systems. Read this article for an overview of 18 types of network security solutions. ServerWatch   [7 Best Free and Open Source NAS Solutions of 2023]( Network-attached storage (NAS) solutions have long been a valuable way for networks to store, organize, and migrate data securely. While there are enterprise-grade NAS solutions, this article will look at free and open-source NAS solutions, highlighting their features, pros, and cons for smaller companies or those on a tight budget. eSecurityPlanet   [How to Enhance IAM by Adding Layers of Zero Trust]( This guide to zero trust and identity and access management (IAM) breaks down these terms, why they’re important, and how they might work together in IT environments.   CONNECT WITH TECHREPUBLIC   We're on TikTok and Instagram now! [Facebook]( [Twitter]( [Instagram]( [LinkedIn]( [TikTok]( [YouTube]( Visit the [Subscription Center]( to get other free newsletters, manage your account settings or to be removed from TechRepublic communications. [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2023 TechnologyAdvice, LLC. All rights reserved. All rights reserved. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here](.