Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Guide to Implementing Data Classification in Microsoft 365

Organizations today store enormous amounts of data. To protect their business and comply with strict modern regulations, they need to manage and secure it properly. Ideally, every document would receive equal protection, but this approach is unrealistic both financially and operationally. Accordingly, organizations need to classify data so they can prioritize their critical and sensitive content.

Why Security Validation is More than Just Pen Testing or Red Teaming

Attack surface management (ASM) has taken center stage in cybersecurity discussions in recent years. The key factor that sets ASM apart from traditional vulnerability management is its more informed and intelligent response to threats – “the attacker’s point of view” so to speak. What makes this possible is security validation. That’s what we focus on in this article.

How Cato Uses Large Language Models to Improve Data Loss Prevention

Cato Networks has recently released a new data loss prevention (DLP) capability, enabling customers to detect and block documents being transferred over the network, based on sensitive categories, such as tax forms, financial transactions, patent filings, medical records, job applications, and more. Many modern DLP solutions rely heavily on pattern-based matching to detect sensitive information. However, they don’t enable full control over sensitive data loss.

What's New in NIST's Cybersecurity Framework 2.0?

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) was published in 2014 for the purpose of providing cybersecurity guidance for organizations in critical infrastructure. In the intervening years, much has changed about the threat landscape, the kinds of technology that organizations use, and the ways that operational technology (OT) and information technology (IT) work and interact.

Oops, Malware! Now What? Dealing with Accidental Malware Execution

On an ordinary day, you're casually surfing the web and downloading some PDF files. The document icons seem pretty legitimate, so you click without a second thought. But, to your surprise, nothing happens. A closer look reveals that what you believed to be a harmless PDF was, in fact, an executable file. Panic sets in as your settings lock up, and even accessing the task manager becomes impossible. Unknown pop-ups invade your screen, telltale signs of malware execution.

What Is Privilege Escalation? How to Detect and Prevent Privilege Escalation Attacks in Windows

Organizations usually rely on remote work capabilities, leading them to use cloud systems. But with increased use of cloud infrastructure, the vulnerability to cyberattacks increases. One such is the Privilege Escalation attack, a complex threat to any network. Multiple defense strategies are required to detect and prevent privilege escalation attacks, but understanding what this attack means is important even before that.

Who Called Me? How To Identify and Prevent Spam Calls

On many occasions, we receive completely unexpected calls from phone numbers we don't know. Let's imagine the situation: you're sitting on your sofa in the middle of the day, and your mobile phone rings from an unknown number. You don't pick it up, but the first thing you ask yourself is, who is calling me? Is it important, or is it spam? There are valuable tactics to avoid receiving spam calls, and finding out who called me is one of the first steps to avoid scams and fraudulent calls.

Analysing Operation FlightNight: A Cyber Espionage Campaign Targeting Indian Government and Energy Sectors

Introduction In recent months, the cybersecurity landscape has witnessed the emergence of sophisticated threats targeting critical infrastructure and governmental entities. One such threat, dubbed "Operation FlightNight," has garnered attention due to its strategic targeting of Indian government entities and the energy sector. Foresiet analysts have been diligently investigating this campaign to understand its modus operandi and implications for cybersecurity.