Contact Us

1 (800) 723-1166 |

News & Views

Olga B. - Sr. Manager, Forcepoint Security Labs, San Diego, CA

Tell us what you do in 40 words or less.

I am a Sr. Manager at Forcepoint Security Labs, specializing in security consulting. Our team works with customers and prospects on strategic initiatives that typically involve strengthening security posture through understanding the security landscape, exposing policy weaknesses, and defining strategy.

Why did you choose Security Consulting?

The... Read More

Throughout September 2016 we have observed an actor sending malware to Canadian nationals by e-mail. Upon investigation we have determined the malware payload to be DELoader, which downloads a Zeus variant banking trojan upon execution.

E-mail Lures

The e-mails typically pretend to be from the Canada Revenue Agency (CRA) claiming that the individual has a tax payment outstanding.

The e-mails contain an MSG attachment with an embedded OLE object. This is not a... Read More

Securing Patient Information in the Accelerated Move to Electronic Health Records (EHR)

Data protection is never more important than when it comes to a person’s health information. With the enacting of the Affordable Care Act, healthcare providers in the public and private sectors saw increased incentives to switch to Electronic Health Records (EHR); however, much of the industry lacks the cybersecurity infrastructure and knowledge to properly support this transition, according to a... Read More

On September 1, 2016 a new trojan downloader became available to purchase on various Russian underground forums. Named "Quant Loader" by its creator, the downloader has already been used to distribute the Locky Zepto crypto-ransomware, and Pony (aka Fareit) malware families.

Locky Zepto & Pony E-mail Campaign

On September 12, 2016 Forcepoint Security Labs™ noticed an e-mail campaign which was typical of one we mainly see distributing the Locky or Dridex botnet 220 malware... Read More

Top Five Security Capabilities I Wanted 10 Years Ago [Part Three]

By Doug Copley, Forcepoint Deputy CISO

I continue today with the next in my blog series of the Top Five security on my wish list in 2006. To recap, here’s the items I’ve discussed so far:

Web security that was more than URL filtering, and worked off-network The ability to detect and block threats BEFORE they were delivered to users

As I share my perspectives on #3, efficiency is the main theme.... Read More

Top Five Security Capabilities I Wanted 10 Years Ago [Part Two]

By Doug Copley, Forcepoint Deputy CISO

Yesterday, I began a Top Five blog series on security technologies I really wanted in 2006 that are now available. Part one began at the bottom with #5 - web security. As we step up to #4 in my Top Five list, you’ll discover my aspiration in 2006 to be proactive, not reactive.

#4 – I wanted technology that would identify threats and block them BEFORE they were... Read More

Dridex has drastically reduced in volume throughout 2016. Actors are now appearing to prefer crypto-ransomware such as Locky over the infamous banking trojan. However, Dridex is still being actively developed.  Here is Forcepoint Security Labs we have seen a number of changes and improvements over the last few months.

Command-and-Control (C&C) Blacklisting

The initial Dridex executable is known as the Dridex Loader.  It is responsible for checking in to its C&C servers, ... Read More

Top Five Security Capabilities I Wanted 10 Years Ago [Part One]

By Doug Copley, Forcepoint Deputy CISO

Anyone whose job requires them to focus on information security is well aware of how fast the industry changes. Just look at the 1,000 or so vendors/researchers/consortiums who were present at RSA and Black Hat in 2016, and you can understand how difficult it can be to stay current on security technologies and practices. In a series of five blogs, I’d like to pause a minute... Read More

Profiling Hacker Groups Threatening the Nation’s Energy Sector

As a member of the Institute for Critical Infrastructure Technology (ICIT), Forcepoint had the opportunity to provide thought leadership expertise to the Institute’s most recent publication, entitled “The Energy Sector Hacker Report: Profiling the Hacker Groups that Threaten our Nation’s Energy Sector”. Stacey Winn, ICIT Fellow for Forcepoint, contributed research on some of the most prominent vulnerabilities in the... Read More

"It's Never Happened Before" is a Terrible Excuse for Ignoring Cybersecurity

By Mark Goldstein, Forcepoint Deputy CISO

When you buy auto insurance, do you think about the possibility of a future crash? When you buy homeowners insurance, do you think about the potential for a house fire or flood? You probably don’t spend much time contemplating crashes or fires. Of course you know there is a chance these things may happen, even though it’s likely a small one. Why buy insurance... Read More