![malware-campaigns-on-legit-services](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2FFuture%2520Insights%25202025_Blog%2520Image-Prediction%25203_23Oct2024.jpg&w=3840&q=75)
X-Labs
Los Hackers Cada Vez Más Construyen Campañas de Malware en Servicios de Infraestructura Legítima
![mayur-sewani.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fmayur-sewani_0.jpg&w=1200&q=75)
![ben-gibney](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-11%2Fben-gibney.jpg&w=640&q=75)
![syed_hassan_faizan.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fsyed_hassan_faizan.jpg&w=828&q=75)
Mayur Sewani & Ben Gibney & Hassan Faizan
November 26, 2024
![Mitigate shadow IT with web security](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-10%2Fweb-security-shadow-it.jpg&w=3840&q=75)
Mitigar los Dos Mayores Riesgos de Shadow IT con Seguridad Web
![corey_kiesewetter.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fcorey_kiesewetter_0.jpg&w=1920&q=75)
Corey Kiesewetter
November 26, 2024
![Malspam header](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-10%2Fmalspam-header-wide.jpg&w=3840&q=75)
X-Labs
Código Malicioso en JavaScript Enviado a Través de Correos Electrónicos mediante PEC (Posta Elettronica Certificata)
![syed_hassan_faizan.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fsyed_hassan_faizan.jpg&w=828&q=75)
Hassan Faizan
December 11, 2024
![AsyncRAT using Python and TryCloudflare](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2F2024-08%2FAsynch%2520RAT.jpg&w=3840&q=75)
X-Labs
Modificación de AsyncRAT: Atacantes Utilizan Python y TryClouflare para Desplegar Malware
![mayur-sewani.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fmayur-sewani_0.jpg&w=1200&q=75)
Mayur Sewani
September 19, 2024
![remcos.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fhero%2Fremcos.jpg&w=2048&q=75)
X-Labs
Acortador de URL en un archivo de Microsoft Word que lleva al Remcos RAT
![syed_hassan_faizan.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fsyed_hassan_faizan.jpg&w=828&q=75)
Hassan Faizan
August 21, 2024
![agent-tesla-header.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fhero%2Fagent-tesla-header_0.jpg&w=1920&q=75)
X-Labs
Viajeros en línea en riesgo: El malware Agent Tesla ataca la industria de viajes
![mayur-sewani.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fmayur-sewani_0.jpg&w=1200&q=75)
![prashant-kumar.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fprashant-kumar_0.jpg&w=1200&q=75)
Mayur Sewani & Prashant Kumar
March 18, 2024
![amdp-hero.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fhero%2Famdp-hero_0_0.jpg&w=2048&q=75)
Forcepoint Amplía las Opciones de Implementación de AMDP
![carlos-carvajal-square.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fcarlos-carvajal-square_0.jpg&w=1080&q=75)
Carlos Carvajal
May 10, 2024
![taiwan-attack-hero.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fhero%2Ftaiwan-attack-hero_0.jpg&w=2048&q=75)
X-Labs
Detalles de un nuevo e innovador ataque de malware avanzado que utiliza Microsoft Office
X-Labs Researcher
February 20, 2024
![erik-ztwa-hero-2.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Fhero%2Ferik-ztwa-hero-2_0.jpg&w=2048&q=75)
RBI es un componente clave del acceso web Zero Trust
![erik-skoralick.jpg](/_next/image?url=https%3A%2F%2Flive-forcepoint-drupal.pantheonsite.io%2Fsites%2Fdefault%2Ffiles%2Ferik-skoralick_0.jpg&w=1920&q=75)
Erik Scoralick
November 6, 2023