Raytheon|Websense Survey Reveals Executives Lack Confidence in Security Posture
Posted: Wednesday, August 19, 2015 6:00 AM by Susan Helmick
Nearly nine in 10 organizations have had at least one breach that resulted in a loss or compromise of data in the past year AUSTIN, Texas, August 19, 2015, – A new survey of security executives at large companies in the U.S., commissioned by Raytheon...   Read more >
Reducing the Risk of Un-managed Email Accounts
Posted: Thursday, August 6, 2015 6:06 PM by Charisse Castagnoli
Recent events have exposed a risk that many organizations are not well versed in: the use of personal web or mobile email accounts on the corporate network. These email accounts are often used in the ordinary course of the day without proper attention...   Read more >
Accounts Payable in the Czech Republic Targeted by Dridex
Posted: Wednesday, August 5, 2015 6:00 PM by Jose Barajas
Websense® Security Labs™ has observed an increase in Dridex being used to target individuals in the Czech Republic. Using malicious email lure themes related to invoicing, the campaign follows a typical pattern of targeting recipients using...   Read more >
Raytheon|Websense Security Labs Will Be At Black Hat USA 2015 and Def Con 23
Posted: Thursday, July 30, 2015 6:00 AM by Carl Leonard
Black Hat USA 2015 starts in the next few days and our security researchers will be in attendance and participating. We are also attending Def Con 23 on 6-9 August 2015. Black Hat and Def Con are seen as the pinnacle of security conferences as security...   Read more >
Survey Finds Employee Negligence is Leading Cause of Insider Threats in the U.S. and Germany
Posted: Thursday, July 30, 2015 6:00 AM by Susan Helmick
Raytheon|Websense survey: Companies still uncertain how to mediate unintentional insider threats beyond training and awareness programs AUSTIN, TX, July 30, 2015 – Employee negligence, which may be caused by multitasking and working long hours,...   Read more >
Network Safety has More in Common With Ships Than you may Think
Posted: Friday, July 17, 2015 3:49 PM by Websense Technical Marketing
On Wednesday, the Committee on Oversight and Government Reform held a hearing to review investigative reports resulting from penetration tests performed on select Department of the Interior (DOI) bureaus (and where the recently breached U.S. Office of...   Read more >
RC4 NOMORE - Decrypting Cookies In Just 52 Hours
Posted: Thursday, July 16, 2015 11:30 AM by Carl Leonard
Researchers Mathy Vanhoef and Frank Piessens, from the University of Leuven, have shown that they can exploit weaknesses in the RC4 algorithm in order to decrypt web cookies used to store end-user content when communicating with HTTPS-enabled websites...   Read more >
Filed under: , , ,
Four Adobe Flash 0-days In Three Weeks - Patches Now Available
Posted: Tuesday, July 14, 2015 7:45 AM by Carl Leonard
Following on from the revelation of a 0-day in Adobe Flash in June 2015 ( CVE-2015-3113 , since patched) 3 further 0-days have been discovered in the last 3 weeks. The 3 have references CVE-2015-5119, CVE-2015-5122, and CVE-2015-5123. The knowledge of...   Read more >
Independent Research Firm Cites Websense® as a Leader in SaaS Web Content Security
Posted: Monday, July 13, 2015 8:05 AM by Susan Helmick
Websense among most significant providers in the category AUSTIN, Texas, July 13, 2015 –Raytheon|Websense (formerly Websense), a global leader in protecting organizations from the latest cyber attacks and data theft, today announced its citation...   Read more >
OpenSSL Update Released for "Alternative chains certificate forgery" Vulnerability
Posted: Thursday, July 9, 2015 7:00 AM by Carl Leonard
Websense® Security Labs™ have, since Monday 6 July, been looking out for details of an anticipated release to the OpenSSL open source toolkit for SSL/TLS. Today (9 July 2015) the OpenSSL Project released an update to the popular toolkit detailed...   Read more >
Filed under: ,
Today’s Lesson: End Users in the Education Sector Are Twice as Likely to Visit Malicious Sites
Posted: Tuesday, July 7, 2015 10:45 AM by Sindyan Bakkal
The threat landscape today is both dynamic and diverse. On one end of the spectrum are mass infections and threats that, while not very sophisticated, cast a wide net. On the other hand, we have very advanced targeted threats that are crafted painstakingly...   Read more >
Announcing the Websense Security Labs 2015 Industry Drill-Down Report - Financial Services
Posted: Wednesday, July 1, 2015 8:00 AM by Carl Leonard
The Security Labs™ team here at Raytheon|Websense® has just released our analysis on the threat landscape specific to the Financial Services industry. By bringing in data from our Websense ThreatSeeker® Intelligence Cloud supplemented with...   Read more >
Filed under:
Adobe Flash Player 0-day Abused In The Wild (CVE-2015-3113), Our Customers Protected
Posted: Wednesday, June 24, 2015 8:20 AM by Carl Leonard
Websense® Security Labs™ researchers are aware of a vulnerability within Adobe Flash Player, CVE-2015-3113. Exploitation of the vulnerability leads to a buffer overflow which can be abused by a malware author to execute arbitrary code on the...   Read more >
Websense® Security Labs Reveals Top Cyber Threat Trends in 2015 Financial Services Drill-Down Report
Posted: Tuesday, June 23, 2015 8:05 AM by Susan Helmick
Financial services businesses encounter security incidents 300 percent more frequently than other industries AUSTIN, Texas, June 23, 2015 – Raytheon|Websense , a global leader in protecting organizations from the latest cyber attacks and data theft...   Read more >
Gartner Magic Quadrant for Secure Web Gateways Positions Websense® as a Leader for Sixth Time
Posted: Wednesday, June 10, 2015 8:05 AM by Susan Helmick
Recognized for vision and ability to execute for TRITON ® solutions AUSTIN, Texas, June 10, 2015 - Websense, Inc., a global leader in protecting organizations from the latest cyber attacks and data theft , has been recognized by Gartner Inc. as a...   Read more >
Large Malvertising Campaign Leads to Angler EK & Bunitu Malware
Posted: Wednesday, June 10, 2015 3:00 AM by ngriffin
Websense® Security Labs™ researchers have been monitoring a mass scale malvertising campaign that leads to Angler Exploit Kit . The attack has affected users browsing to many popular sites, including CNN Indonesia, the official website of Prague...   Read more >
Websense® TRITON® Wins Best Data Leakage Prevention at 2015 SC Magazine Awards Europe
Posted: Tuesday, June 9, 2015 7:47 PM by Susan Helmick
Websense is pleased to announce its data loss prevention solutions won recognition at the annual 2015 SC Magazine Awards Europe. The awards were presented June 2nd at the awards banquet held at The Ballroom Grosvenor House in London. Websense TRITON AP...   Read more >
What does the payoff in the Finale look like?
Posted: Friday, June 5, 2015 12:29 PM by Sindyan Bakkal
The seventh stage is the crowning glory of the attack kill chain and depending on the motive the attacker is usually keen to get to the data theft stage. In general, the previous stages help the attacker reach their objective. Attackers are known to go...   Read more >
Raytheon Announces Completion of Commercial Cybersecurity Joint Venture Transaction with Vista Equity Partners
Posted: Friday, May 29, 2015 12:38 PM by Susan Helmick
Raytheon|Websense to provide broad set of defense-grade solutions to rapidly-growing, global commercial cybersecurity markets WALTHAM, Mass. (May 29, 2015) – Raytheon Company (NYSE: RTN) and Vista Equity Partners have completed a joint venture transaction...   Read more >
More SSL Mess - Logjam
Posted: Thursday, May 21, 2015 3:18 AM by Tamas Rudnai

More SSL Mess - Logjam

Can we get through a quarter without a major high profile SSL vulnerability? OpenSSL regularly patches high severity issues, however only certain vulnerabilities catch the media’s fancy. Logjam adds to the list of recently discovered high profile SSL vulnerabilities, which include Heartbleed, Poodle and FREAK to name a few. With an estimated 8.4 percent of the Top 1 million domains affected at the time of publication of this blog, this vulnerability poses a significant risk to the internet ecosystem much the same way its predecessors have and still do.

...   Read more >
More News & Views...