Contact Us

1 (800) 723-1166 |

All Blogs

One of the things I enjoy about my role at Forcepoint is how it sometimes gives me the time and space to just lean back, listen, and think about how folks are experiencing the current security landscape.

Last month I took the opportunity to do just that at the Gartner Security and Risk Management Summit in National Harbor, MD. Not the behemoth of a conference such as RSA and Black Hat, the Gartner event is smaller, more intimate, and provides attendees with a pretty thoughtful set of... Read More

Please note:​ This is an update to our original analysis posted on June 27, 2017.

Forcepoint Security Labs will continue to refer to this as a Petya outbreak, although other vendors have chosen to apply additional or alternative names to it.

In straightforward terms, the samples analysed have passed the ‘duck test’ as Petya which has previously been seen to:

Encrypt files on disk without changing the file extension;... Read More

Forcepoint Security Labs is aware of a new variant of the Petya ransomware that impacts organizations worldwide. Reports are coming in from organizations in the UK, Ukraine, Netherlands, Spain, the United States and other markets. We have identified the ransomware as being able to spread laterally within an organization via a vulnerability in the SMBv1 protocol. 

The attacks are linked through the use of a common bitcoin wallet and below is a screenshot of the ransomware message... Read More

Most government agencies charged with protecting data and missions critical to national security utilize a physically separated network architecture. Typically referred to as network segmentation, this architecture is built for security first and grew out of the data classification paradigm with a separate network for each classification level.

While this segmentation is highly secure it has not always been the most usable, requiring duplication of hardware and infrastructure and... Read More

Almost 2,500 years ago Leonidas and his force of roughly 7,000 Greek soldiers battled against Xerxes and his Persian army numbering in the hundreds of thousands. The Greeks held off the Persian army for seven days at a mountain pass named Thermopylae providing critical time for Athens to be evacuated and for Greece to prepare for a final confrontation with Xerxes. The story of Leonidas and his Spartan’s has served as the inspiration for countless books and movies, including the popular “300... Read More

Microsoft Security Advisory 4025685 [1] was released on Tuesday 13 June 2017 and quickly gathered a large amount of attention for fixing a significant number of SMB exploits in supported versions of Windows and for Microsoft's decision, once again, to provide patches for now-unsupported versions of their operating systems.

While Microsoft rate the SMB vulnerabilities as Important rather than Critical, it should be borne in mind that vulnerabilities within network services such as... Read More

You’ve heard by now that Gartner has released the 2017 Magic Quadrant for Secure Web Gateways (SWG).  Reports like these can provide guidance to organizations looking to get educated on a technology market, and industry analysts like Gartner are in a unique position to provide their perspective. However, because of their different vantage points, vendors and analysts don’t always share the exact same views on a given market.

As pioneers in cloud security with a track record of... Read More

At around 09:00 BST yesterday, Forcepoint Security Labs™ observed a significant malicious email campaign from the Necurs botnet. Necurs is a prevalent botnet that is known to spread Locky ransomware, pump-and-dump stock scams, and more recently the Jaff ransomware.

This time, however, Necurs has been observed spreading the Trickbot banking Trojan for the first time. The malicious email campaign ended at around 18:00 yesterday and nearly 9.6M related emails were captured and stopped... Read More

I’ve been doing cybersecurity for the past 20 years. In the beginning of my career, I was on the offensive side doing penetration testing, but then I became more interested in defensive work (although #shell in the test lab still makes me grin). During the past 15 years, I’ve been running security research operations and have been privileged to work with a lot of super-smart people.

To be successful in security research requires passion – living and breathing it 24x7. That’s... Read More

Human-centric approach key to protecting employees, critical business data and IP

Forcepoint India Solution Day, an annual multicity conference on IT security was held earlier in the month in India, in three of its biggest cities – Delhi, Mumbai and Bengaluru. The event titled “Securing The Human Point”, was aimed at bringing in a change in the mindset of end-user organisations and IT partners to re-evaluate their security strategy for the coming years by understanding The Human Point.... Read More