A privilege escalation vulnerability discovered in Forcepoint VPN Client for Windowsdiscovered by Security Researcher Peleg Hadar of SafeBreach Labs can be used by attackers to evade detection and achieve persistence.

A privilege escalation vulnerability discovered in Forcepoint VPN Client for Windowsdiscovered by Security Researcher Peleg Hadar of SafeBreach Labs can be used by attackers to evade detection and achieve persistence.
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
Software vulnerabilities, like the one found in Forcepoint VPN Client for Windows, can mean real problems for organizations. Once a hacker has exploited the vulnerability, they gain significant power over the end-user’s system. While it is not clear if the vulnerability also gives access to corporate resources, businesses should be certain to have access to network traffic analysis to understand how machines across the network are behaving. By having a baseline of normal user behavior, organizations can understand how compromised machines have taken data off the network or compromised other systems. For organizations with Forcepoint VPN Clients, it is important to update the software to the latest release and to monitor devices with the compromised client. By looking at their network traffic patterns, it will be easy to spot the exploited devices.