Skip to main content
Forcepoint
Government
Partners
Partners
Partner Login
Find a Partner
Global Partner Program
Become a Partner
Technology Partners
Find a Distributor
Services & Support
Services & Support
Support Login
Professional Services
Training
Company
Company
Customers
Newsroom
Work With Us
Events
Contact Us
Forcepoint Trust Hub
EN - English
ES - Español (América Latina)
FR - Français
DE - Deutsch
IT - Italiano
PT-BR - Português
ZH-HANS - 简体中文
ZH-HANT - 繁體中文
JA - 日本語
KO - 한국어
TR - Türkçe
Enter your keywords
Is Type
Ran Mosessco
Jump to
Why Forcepoint
Why Forcepoint
Our Approach
Our data-first approach to cybersecurity
Our Customers
We help people work freely, securely and with confidence
About Us
Our vision and mission
Products
Products
CLOUD-NATIVE PLATFORM
Forcepoint ONE SSE
CASB
ZTNA
SWG
RBI
ZT CDR
DATA SECURITY
DLP
Data Visibility
Risk-Adaptive DLP
Insider Threat
NETWORK SECURITY
Secure SD-WAN
Next-Gen Firewalls
Cross Domain Solutions
VIEW ALL PRODUCTS
Use Cases
Use Cases
Data Security
Adopt Continuous Zero Trust Security
Migrate from Symantec
Comply with GDPR
Secure Data Transfer
Cloud Security
Simplify Security with SSE
Work Safely Anywhere With SASE
Secure Cloud Apps
Safely Use Microsoft Office 365
Industries
Government
Critical Infrastructure
Finance
Healthcare
Energy
Network Security
Protect Remote Offices
Securely Enable Remote Workers
VIEW ALL USE CASES
Resources
Resources
group
Blog
Webcasts
Podcasts
Analyst Reports
Customer Stories
Cyber Edu
Resource Library
Events
Training
Webinar Hub
group
Popular Blog Post
Forcepoint ONE Simplifies Security for Customers
Read Blog Post
Popular Resources
The Forcepoint Webinar Hub
Watch Now
Your Path to Zero Trust
Read eBook
VIEW ALL RESOURCES
Schedule a Free Demo
Main Menu
You are here
Home
:
Resources
:
Ran Mosessco
Author Page
All
All
X-Labs
Audiences
CXO Cybersecurity Perspectives
Government Cybersecurity
Ran Mosessco
Principal Security Researcher
Thanks for Giving, Emotet!
Dridex Down Under
Charting the Unexplored Threat Galaxy
Kelihos Botnet Trying to Expand by Harnessing Russian National Sentiments
METRO.US Website Compromised to Serve Malicious Code
New year, new look - Dridex via compromised FTP
Cyber Criminals Ramp Up Use of Exploit Kits in Fake Skype, Evernote Themed Attacks
Exploit Kits "Lacking P(a)unch"
Up to 37% of Enterprise Computers Vulnerable to Microsoft Office Zero-day CVE-2013-3906
Low Volume, High Payoff Attacks Target Financial Services Industries in Asia
Custom Attachment Names and Passwords for Trojans
The Hunt for Red October
Pak Hack Attack: Pastebin Reveals Attacks
When Less is More: The Growing Impact of Low-Volume Email Attacks
Hook, line and sinker: the dangers of Location-Based Services
Voice Mail Notifications and ADP Emails Lead to Blackhole Exploit Kit
Malicious Email Messages Posing as Antivirus Notifications
You may be Surprise too receive this letterfrom me. . .
Braaaaaaaaaaaiiiiiiiiiiiiiins!
Drawing the line on government censorship
Believe it or not—even MORE internet porn
Spoofed Xanga malicious emails, similar to Craigslist campaign
Malicious URLs in Fake Craigslist Emails
Pinning Down Pinterest
Buyers beware—of Olympic scams
From ".com" to ".anything"
Did you know ... about the dangers of online drug shopping?
What's More Scary, Hurricanes or Black Holes?
A refreshing change to our .ORG site: it's now serving spam
Spammers, the Pioneers of Going Green
Load More