menu

Contact Us

1 (800) 723-1166 |

All Blogs

Today, Forcepoint announced the availability of a host of new features to help businesses safely adopt cloud applications and provide human centric security to users everywhere they work. These updates can be downloaded now from the Forcepoint Support Portal.

Among the 15 features and updates we launched today, I’d like to highlight four in this post:

Forcepoint Web Security cloud application discovery and risk reporting Forcepoint CASB and Forcepoint Advanced Malware... Read More

A week on from the WannaCry outbreak, a huge number of articles have been written on the topic. These have covered everything from in-depth analyses of WannaCry itself to discussion pieces about the EternalBlue and DoublePulsar exploits and, latterly, warnings about other pieces of malware using the same propagation techniques as WannaCry.

Forcepoint™ customers are protected against the underlying EternalBlue exploit via NGFW at the following stages of attack:

Stage Four (... Read More

Many of the technical aspects of the WannaCry ransomworm outbreak on Friday 12 May 2017 are well documented by this point: the primary means by which the malware spread appears to have been the use of the DoublePulsar and EternalBlue code released by the Shadow Brokers earlier this year and patched as part of Microsoft's MS17-010 update on 14 March 2017.

As we noted in our initial blog post on the topic (https://blogs.forcepoint.com/security-labs/wannacry-ransomware-worm-targets-... Read More

Please note: Forcepoint Security Labs have now published an in-depth analysis of the EternalBlue propagation method used by the WannaCry campaign. This can be found here: https://blogs.forcepoint.com/security-labs/wannacry-post-outbreak-analysis

Yesterday, the world saw one of the most significant malware outbreaks for quite some time: our news feeds are full of the news of this cyber attack with institutions in many countries being impacted and reports of whole computer networks... Read More

Please note: this post is not related to the global WannaCry outbreak on Friday 12 May 2017. For ongoing up dates on WannaCry, please see our blog post at https://blogs.forcepoint.com/security-labs/wannacry-ransomware-worm-targets-unpatched-systems

Forcepoint Security Labs™ have observed today a major malicious email campaign from the Necurs botnet spreading a new ransomware which appears to call itself 'Jaff', peaking within our telemetry at nearly 5m emails per hour. 

... Read More

Guardians of the Galaxy Vol. 2 premiered last week and if you’re a huge Chris Pratt fan like me, you’ve been waiting for this for a while. The Guardians’ movie series focuses around unlikely heroes protecting the galaxy and unifying to – you guessed it – guard the galaxy. This got us thinking. While it might not be inherently obvious, if you take a look at the overall theme of the movies you can draw a parallel to an effective cybersecurity organization. Many of the best organizations and... Read More

Forcepoint Security Labs have recently observed a malicious email campaign delivering what appears to be a new variant of the Geodo/Emotet banking malware, predominantly to .UK TLDs across a range of sectors including addresses at major business and government departments.

Several prior campaigns have been recorded with researchers noting a progressive evolution in the methods employed by the actors behind the malware: earlier versions were reported delivering the malware as an... Read More

IDC Business Value Snapshot: The Business Value In Switching to Forcepoint NGFW

Many technology organizations make bold claims about ROI, but more often than not, there isn’t any data to back up those claims. We are happy to break the mold. Our Next Generation Firewall (NGFW) is designed to deliver high efficiency, availability and security for distributed organizations. And, here are the numbers to prove it.

IDC Research, one of the leading research... Read More

In a recent blog we talked about how the current ransomware pandemic continues to attract would-be cybercriminals to ransomware-as-a-service (RaaS) platforms. In this post we will look into a new piece of ransomware called "CradleCore" - a crimeware kit that is currently being offered to cybercriminals looking to own customisable ransomware source code.

CradleCore,  a.k.a. "Cradle Ransomware", is peculiar in the sense that it is being sold as source code. Typically, ransomware is... Read More

In the past year, the Healthcare sector was one of the biggest industries that were hit by ransomware attacks. Being inclined to paying ransom to recover patient data, the Healthcare sector became a low hanging fruit for seasoned ransomware operators looking to maximize profit, such as those behind the Locky ransomware. However, it appears that amateur cybercriminals have also started to shift towards this trend in the form of an off-the-shelf ransomware aimed at a healthcare organization in... Read More