Category: Forcepoint
The ‘Acropalypse,’ Chat GPT’s GPT-4, CISA ‘s Critical Infrastructure Advisories and More
A severe privacy flaw dubbed ‘acropalypse’ has been found to affect the Windows 11 Snipping Tool, allowing people to partially recover content that was edited out of an image. This […]Effective Content Disarm and Reconstruction
Zero Trust CDR – A modern approach The first problem is that not all malware is executable code. Applications are invariably so complex that they contain flaws, mostly in the […]Ransomware and How to Stop It
This is particularly a problem with old systems that should’ve been upgraded years ago. It’s why technical debt is real for many organizations. Take Windows 7, for example. The OS is […]Examining the Recent ClamAV Security Flaw
But this means they have to understand the container file format and handle its structures—it’s no longer treating all the data as a simple pile of bytes. But if the […]Security News—Biden’s Cybersecurity Strategy, CISA Calls Out Tech Companies, Dish Network Ransomware Attack, Hackers Beat MFA and More
The Biden administration released a national cybersecurity strategy that advocates for more tech regulation and software liability reform, including imposing minimum security standards for critical infrastructure and shifting responsibility forSecurity News—ChatGPT and Cybersecurity, Ukraine Cyberwar Lessons, ICS Vulnerabilities, Mirai Botnet Variant and More
AI chatbots, such as ChatGPT from OpenAI, can be used to help facilitate malicious cyber activities, even though the terms of service of these AI-driven tools ban cybercrime activities. Cybercriminals […]Zero Trust CDR for Mail: Microsoft 365 is Here!
That’s why Forcepoint’s new Zero Trust Content Disarm and Reconstruction (CDR) for Mail is built specifically for Microsoft 365 Mail. Pivoting away from detection-based protection, Zero Trust CDR for Mail: […]Taming the Data ROT Beast
Data within organizations tends to literally multiply through duplicates, duplicates of duplicates, etc. This is a problem often referred to as redundant data. Data also can no longer be valid. […]Forcepoint Releases DLP at Scale to Customers
Enabling DLP at greater scale We also recently extended the capabilities of Risk-Adaptive Protection, helping customers utilize this powerful monitoring tool to increase the impact of their Zero Trust programs. […]Security News—Breaking RSA Encryption, Hacks at Royal Mail, PayPal and T-Mobile and More ChatGPT
PayPal is notifying thousands of users that their accounts were accessed through a large-scale credential stuffing attack that exposed some personal data. The attack occurred between December 6 and December […]Load More