Category: Forcepoint
VPNLab[.]net Service Shutdown, Aftermath of Kronos Attack, Public Sector Ransomware Attacks in 2021, Data-wiping Software Targets Ukraine, APT35 Uses PowerShell Log4j Backdoor
Law enforcement agencies across 10 nations, including the FBI shut down a 15-server VPN operation used by cybercriminals to anonymize ransomware attacks. According to Ukranian law enforcement, VPNLab[.]net provided cover for at least 150Protecting the Most Dangerous Door to Data Loss
Email is the most popular threat vector for attackers to use for delivering malware to an organization. Email is also a direct line of contact between users and cybercriminals, leading […]Why Cybersecurity Cannot Be Separated from National Security
In the episode, Alperovitch brings a particularly important perspective to the table as we think about threats like ransomware or supply chain attacks. To decontextualize the technology from politics is […]2021 Malware Report: The Looming Ransomware Threat
With high-profile malware and ransomware attacks capturing recent headlines, organizations have elevated this problem to a top priority,” said Holder Schulze, founder, Cybersecurity Insiders. The study, a joint ventureCashing in on Crypto
If proof were needed, regulators in both the UK and USA have just published guidance on cryptocurrencies for banks and financial institutions. The Sunday Times reported that the Bank of […]Securing the Perimeter of Higher Education – A Fireside Chat with SUNY Plattsburgh
Higher education institutions of today must practice a delicate balancing act of delivering a high-quality, uninhibited student experience while simultaneously mitigating the risk of both external and internal threats – […]Forcepoint Security News: Log4Shell Vulnerability, Pfizer Trade Secrets Exfiltration, Classifieds Site Leaked Personal Info via the F12 Key, and Hive Ransomware Enters Big League
The recently discovered Log4Shell vulnerability in the popular open source Log4j logging software lets an attacker gain access to a vulnerable system by sending a specially crafted text string to the system. That text string eventually getsCool Heads and Hot Wallets
Why is Cryptocurrency so hot? Rising inflation is devaluing cash reserves by the day, making crypto an ever more attractive investment opportunity. Here’s my perspective on the key takeaways from […]Product Spotlight—Bitglass Platform DLP December 14
Because it’s built with familiar policy models, you won’t need to reinvent your approach and policies as you move to the cloud. Bitglass’ integrated, high performance engine ensures immediate compliance […]Dr. Andrew Hammond Talks Cyber Espionage, Spy Museum and More
Indeed, the desire to know what an adversary is doing is hardly a new one. Instead, technology and the role of the intelligence agent have changed. Just as the invention […]Load More