menu

Contact Us

1 (800) 723-1166 |

All Blogs

One of the things that makes Forcepoint different from other Next Generation Firewall (NGFW) vendors is the way we extensively use the cloud with our network security products to connect and protect our customers in innovative ways. Today, we’re taking it even further, announcing our new Forcepoint Advanced Malware Detection (AMD) cloud service alongside the new NGFW 6.2 release of our unified software for firewalls and intrusion prevention systems (IPS). They’re both extremely easy to roll... Read More

For the past several weeks, Forcepoint Security Labs have been tracking a seemingly low-profile piece of malware which piqued our interest for a number of reasons: few samples appear to be available in the wild; there is no previous documentation referring to the C2 domains and IP addresses it uses (despite the domains appearing to be at least twelve months old); and, if its compilation timestamps are to be trusted, the campaign itself may have been active for at least six months before... Read More

Since January of this year, Forcepoint Security Labs™ have observed that the DragonOK campaign have started to target political parties in Cambodia. DragonOK is an active targeted attack that was first discovered in 2014. It is known to target organizations from Taiwan, Japan, Tibet and Russia with spear-phishing emails containing malicious attachments. 

The latest dropper they used is disguised as an Adobe Reader installer and installs yet another new custom remote access... Read More

In early March 2017 we saw a surge in malware samples with similar behaviours and low detection rates, often triggering only generic and/or heuristic antivirus signatures. Examining these revealed them to be samples of the venerable njRAT Trojan (also known as Bladabindi) and, unsurprisingly, shows their post-infection behaviour and capabilities to align with known njRAT patterns (keylogging, screen-capturing, etc.)

Two samples were examined in particular: both of these downloaded a... Read More

The Growing Cultural Impact of Millennials in the Federal Workforce 

by Michael Crouse, Sr. Director Business Solutions, Data & Insider Threat Security Business

How can federal agencies allow millennial workers access to their devices and social media, but also ensure that they have the security in place so that millennials can’t abuse these services?

Today, many federal agencies are simply not prepared for the ongoing influx of millennials into their... Read More

Since late last year, multiple warnings have been issued to the public regarding tax-related fraud campaigns. Last month, a warning was issued to Northwich residents in the UK regarding a HM Revenue & Customs (HMRC) phishing scam, while the Internal Revenue Service (IRS) issued a similar warning to US tax payers.

Forcepoint Security Labs™ have observed a similar trend in our telemetry. Small to medium-sized tax-themed email campaigns have constantly appeared since the start of... Read More

Forcepoint is proud to be ranked #3 on Cybersecurity Ventures’ Cybersecurity 500, a global compilation of leading companies that represents the hottest and most innovative cybersecurity companies to watch in 2017. Rising from #41 last year, this top ranking is a testament to the company’s momentum on the heels of RSA where our team highlighted Forcepoint’s new solution capabilities and strategic focus, the latest research findings from Forcepoint Security Labs and the company’s... Read More

Forcepoint™ Security Labs frequently identify new, unusual, or otherwise interesting pieces of malware. Sometimes these turn out to be elements of large, APT-driven campaigns (e.g. our report into the MONSOON campaign from August 2016: https://blogs.forcepoint.com/security-labs/monsoon-analysis-apt-campaign); other times these can be more 'niche', as is the case with this miniature Monero mining botnet.

Much as the California Gold Rush attracted amateurs lured by the promise of easy... Read More

For many, ‘virtual’ currencies such as Bitcoin remain a mystery primarily associated with online criminals, despite no longer being far removed from the monetary system and transactions we’re used to.

This article is intended to serve as a primer, rather than one of our more usual technical analyses: cryptocurrencies continue to play a key role in many areas of cyber-crime being used for everything from online marketplace transactions to ransomware demands. However, with a number of ... Read More

Researchers at Google and CWI have been the first to create a practical collision attack against the SHA-1 cryptographic hash function.  Previously a collision was only possible in theory with the premise that a significant amount of computing power would be necessary to generate a collision.  Now it seems as though that computing power has been harnessed by the team who have named the collision issue “SHAttered”.

Cryptographic hash functions such as SHA-1 are used... Read More